How unique is your. onion? an analysis of the fingerprintability of tor onion services
Recent studies have shown that Tor onion (hidden) service websites are particularly
vulnerable to website fingerprinting attacks due to their limited number and sensitive nature …
vulnerable to website fingerprinting attacks due to their limited number and sensitive nature …
Fingerphoto spoofing in mobile devices: a preliminary study
Biometric-based authentication for smart handheld devices promises to provide a reliable
and alternate security mechanism compared to traditional methods such as pins, patterns …
and alternate security mechanism compared to traditional methods such as pins, patterns …
Two-factor authentication: is the world ready? Quantifying 2FA adoption
As text-based passwords continue to be the dominant form for user identification today,
services try to protect their costumers by offering enhanced, and more secure, technologies …
services try to protect their costumers by offering enhanced, and more secure, technologies …
ABC: Enabling smartphone authentication with built-in camera
Reliably identifying and authenticating smart-phones is critical in our daily life since they are
increasingly being used to manage sensitive data such as private messages and financial …
increasingly being used to manage sensitive data such as private messages and financial …
Leveraging personal devices for stronger password authentication from untrusted computers
M Mannan, PC van Oorschot - Journal of Computer Security, 2011 - content.iospress.com
Internet authentication for popular end-user transactions, such as online banking and e-
commerce, continues to be dominated by passwords entered through end-user PCs. Most …
commerce, continues to be dominated by passwords entered through end-user PCs. Most …
Evaluating attack and defense strategies for smartphone pin shoulder surfing
We evaluate the efficacy of shoulder surfing defenses for PIN-based authentication systems.
We find tilting the device away from the observer, a widely adopted defense strategy …
We find tilting the device away from the observer, a widely adopted defense strategy …
Xhound: Quantifying the fingerprintability of browser extensions
O Starov, N Nikiforakis - 2017 IEEE Symposium on Security …, 2017 - ieeexplore.ieee.org
In recent years, researchers have shown that unwanted web tracking is on the rise, as
advertisers are trying to capitalize on users' online activity, using increasingly intrusive and …
advertisers are trying to capitalize on users' online activity, using increasingly intrusive and …
FPRandom: Randomizing core browser objects to break advanced device fingerprinting techniques
The rich programming interfaces (APIs) provided by web browsers can be diverted to collect
a browser fingerprint. A small number of queries on these interfaces are sufficient to build a …
a browser fingerprint. A small number of queries on these interfaces are sufficient to build a …
Improving home automation security; integrating device fingerprinting into smart home
AC Jose, R Malekian, N Ye - IEEE Access, 2016 - ieeexplore.ieee.org
This paper explains the importance of accessing modern smart homes over the Internet, and
highlights various security issues associated with it. This paper explains the evolution of …
highlights various security issues associated with it. This paper explains the evolution of …