Access the full text.
Sign up today, get DeepDyve free for 14 days.
Lukasz Olejnik, Gunes Acar, C. Castelluccia, Claudia Díaz (2015)
The Leaking Battery - A Privacy Analysis of the HTML5 Battery Status API
Gavin Brown, Adam Pocock, Ming-Jie Zhao, M. Luján (2012)
Conditional Likelihood Maximisation: A Unifying Framework for Information Theoretic Feature SelectionJ. Mach. Learn. Res., 13
Zang Li, Wenyuan Xu, Robert Miller, W. Trappe (2006)
Securing wireless systems via lower layer enforcements
Tadayoshi Kohno, A. Broido, K. Claffy (2005)
Remote physical device fingerprinting2005 IEEE Symposium on Security and Privacy (S&P'05)
Anupam (2016)
Das Nikita Tracking Mobile Web Users Through Motion Attacks Defenses InProceedings of the rd Annual Network and Distributed SystemSensors Security Symposium, 16
Jan Spooren, D. Preuveneers, W. Joosen (2015)
Mobile device fingerprinting considered harmful for risk-based authenticationProceedings of the Eighth European Workshop on System Security
M. Riezenman (2000)
Cellular security: better, but foes still lurkIEEE Spectrum, 37
Anupam (2014)
Das Nikita Do You Hear What Hear Fingerprinting Smart Devices Through Embedded Acoustic Components InProceedings of the st SIGSAC Conference on Computer and Communications pagesSecurity, 14
Duncan Black (1958)
The theory of committees and elections, 11
Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, D. Boneh (2014)
Mobile Device Identification via Sensor FingerprintingArXiv, abs/1408.1416
Moon (1999)
Estimation and removal of clock skew from network delay measurements InProceedings of the th International Conference on pagesAnnual IEEE Computer Communications, 28
P. Eckersley (2010)
How Unique Is Your Web Browser?
Nick Nikiforakis, L. Invernizzi, A. Kapravelos, S. Acker, W. Joosen, Christopher Krügel, Frank Piessens, G. Vigna (2012)
You are what you include: large-scale evaluation of remote javascript inclusionsProceedings of the 2012 ACM conference on Computer and communications security
Gordon Lyon
a free network mapping and security scanning tool http nmap org, 27
Nielsen
We Spend More Time On Smartphones Than Traditional PCs http www ibtimes com we spend more time smartphones traditional pcs nielsen
Fyodor Yarochkin
project http ofirarkin wordpress com xprobe
Francesco Cervellini (2018)
Amazon Mechanical TurkAdvances in Intelligent Systems and Computing
Gunes Acar, Marc Juárez, Nick Nikiforakis, Claudia Díaz, Seda Gürses, Frank Piessens, B. Preneel (2013)
FPDetective: dusting the web for fingerprintersProceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Anupam Das, N. Borisov, M. Caesar (2014)
Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic ComponentsProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Neal Patwari, S. Kasera (2007)
Robust location distinction using temporal link signatures
Jason Franklin, Damon McCoy (2006)
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting
Zhou (2014)
Acoustic Fingerprinting Revisited : Generate Stable Device ID Stealthily with Inaudible Sound InProceedings of the st Conference on Computer and Communications pagesSecurity, 21
Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, G. Giacinto (2015)
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?Proceedings of the 31st Annual Computer Security Applications Conference
Lukasz Olejnik, C. Castelluccia, Artur Janc (2012)
Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns
G. Lyon (2009)
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Jason Franklin (2006)
and Sicker Passive Data Layer Wireless Device Fingerprinting InProceedings of the th Conference onSecurity Symposium, 20
Anupam Das, N. Borisov, M. Caesar (2016)
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses
Nick Nikiforakis (2012)
Giovanni You are what you include : large - scale evaluation of remote javascript inclusions InProceedings of the th SIGSAC conference on Computer and Communications pagesSecurity, 30
Pierre Laperdrix, Walter Rudametkin, B. Baudry (2016)
Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints2016 IEEE Symposium on Security and Privacy (SP)
Jean Charles (1781)
de sur les élections au scrutin de l académie royale deshistoire sciences, 17
Nick Nikiforakis
Deceiving with Little Lies of the th International Conference on WWW pagesWorld Wide Web, 31
K. Mowery, H. Shacham (2012)
Pixel Perfect : Fingerprinting Canvas in HTML 5
Sanorita Dey (2014)
Imperfections of Accelerometers Make Smartphones of the st Annual Network and Distributed SystemSecurity Symposium, 18
Lukasz Olejnik (2012)
Why Johnny Can t Browse in On the Uniqueness of Web Browsing Patterns In th Workshop on Hot Topics in PrivacyPeace History Enhancing Technologies
S. Dey, Nirupam Roy, Wenyuan Xu, Romit Choudhury, Srihari Nelakuditi (2014)
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable
Anupam (1503)
Das Nikita Exploring Ways To Mitigate Sensor - Based Smartphone Fingerprinting, 15
S. Moon, P. Skelly, D. Towsley (1999)
Estimation and removal of clock skew from network delay measurementsIEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), 1
Ho (1994)
Tin Kam Jonathan Decision combination in multiple classifier systems transactions on pattern analysis and machine intelligenceIEEE, 21
Andreas Kurtz, Hugo Gascon, Tobias Becker, Konrad Rieck, F. Freiling (2016)
Fingerprinting Mobile Devices Using Personalized ConfigurationsProceedings on Privacy Enhancing Technologies, 2016
Zang Li (2006)
Rob and Securing Wireless Systems via Lower Layer InProceedings of the th ACM Workshop on Wireless pagesSecurity, 26
Thomas Hupperich
Davide Marc Thorsten and Giorgio Giacinto On the Robustness of Mobile Device Fingerprinting : Can Mobile Users Escape Modern Web - Tracking Mechanisms ? InProceedings of the st Computer Security Applications Conference pagesAnnual, 22
Tadayoshi Kohno (2005)
Remote Physical Device Fingerprinting Transaction on Dependable SecureIEEE Computing, 23
Neal Patwari (2007)
Robust Location Distinction Using Temporal Link Signatures InProceedings of the th Annual ACM International Conference on Mobile pagesComputing Networking, 13
Turk
Amazon Mechanical https www mturk com mturk welcome
Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, Claudia Díaz (2014)
The Web Never Forgets: Persistent Tracking Mechanisms in the WildProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Nick Nikiforakis, W. Joosen, B. Livshits (2015)
PriVaricator: Deceiving Fingerprinters with Little White LiesProceedings of the 24th International Conference on World Wide Web
Pierre Laperdrix (2016)
Beauty and the Beast : Diverting modern web browsers to build unique browser fingerprints InProceedings of the th on Privacy pagesIEEE Symposium Security, 25
Zhe Zhou, Wenrui Diao, Xiangyu Liu, Kehuan Zhang (2014)
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible SoundProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Gunes Acar (2014)
Claudia The Web never forgets : Persistent tracking mechanisms in the wild InProceedings of the st Conference on Computer and Communications pagesSecurity, 21
Anupam Das, N. Borisov, M. Caesar (2015)
Exploring Ways To Mitigate Sensor-Based Smartphone FingerprintingArXiv, abs/1503.01874
Lukasz Olejnik
Claudia The leaking battery privacy analysis of the HTML Battery Status API Cryptology ePrint Archive Report http eprint iacr org
Andreas Kurtz (2016)
Fingerprinting Mobile Devices Using Personalized Proceedings onConfigurations Privacy Enhancing Technologies, 24
Hristo Bojinov (2014)
Mobile Device Identification via Sensor Fingerprinting abs urlhttp arxiv org abs, 12
D. Black, R. Newing, I. McLean, A. McMillan, B. Monroe (1998)
The theory of committees and elections . And Committeedecisions with complementary valuation
T. Ho, J. Hull, S. Srihari (1994)
Decision Combination in Multiple Classifier SystemsIEEE Trans. Pattern Anal. Mach. Intell., 16
AbstractThe ability to track users’ activities across different websites and visits is a key tool in advertising and surveillance. The HTML5 DeviceMotion interface creates a new opportunity for such tracking via fingerprinting of smartphone motion sensors. We study the feasibility of carrying out such fingerprinting under real-world constraints and on a large scale. In particular, we collect measurements from several hundred users under realistic scenarios and show that the state-of-the-art techniques provide very low accuracy in these settings. We then improve fingerprinting accuracy by changing the classifier as well as incorporating auxiliary information. We also show how to perform fingerprinting in an open-world scenario where one must distinguish between known and previously unseen users.We next consider the problem of developing fingerprinting countermeasures; we evaluate the usability of a previously proposed obfuscation technique and a newly developed quantization technique via a large-scale user study. We find that both techniques are able to drastically reduce fingerprinting accuracy without significantly impacting the utility of the sensors in web applications.
Proceedings on Privacy Enhancing Technologies – de Gruyter
Published: Jan 1, 2018
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.