Search Results

1 - 10 of 24 items :

  • "device fingerprint" x
Clear All

References [1] Kristol D.M., HTTP cookies: Standards, privacy, and politics, ACM Trans. Internet Techn. 1 (2) (2001) 151–198. [2] Low C., Cookie law explained, 2016. on-line https://www.cookielaw.org/the-cookie-law/ (retrieved:03/2020). [3] Alaca, F., Van Oorschot, P. C. (2016, December). Device fingerprinting for augmenting web authentication: classification and analysis of methods. In Proceedings of the 32nd Annual Conference on Computer Security Applications (pp. 289-301). [4] Nagaraja, S., Shah, R. (2019, May). Clicktok: click fraud detection using traffic

conference on Mobile systems, applications, and services, pp. 97-110, ACM, 2013. [8] Apple, “Worldwide Developer’s Conference (WWDC) Keynote 2014.” http://devstreaming.apple.com/videos/wwdc/2014/101xx36lr6smzjo/101/101_hd.mov. [9] P. Eckersley, “How unique is your web browser?,” in Privacy Enhancing Technologies, pp. 1-18, Springer, 2010. [10] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna, “Cookieless monster: Exploring the ecosystem of web-based device fingerprinting,” in Security and Privacy (SP), 2013 IEEE Symposium on, pp. 541

Randwyk, and Douglas Sicker. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. In Proceedings of the 15th Conference on USENIX Security Symposium , 2006. [21] Tin Kam Ho, Jonathan J. Hull, and Sargur N. Srihari. Decision combination in multiple classifier systems. IEEE transactions on pattern analysis and machine intelligence , 16(1):66–75, 1994. [22] Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, and Giorgio Giacinto. On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms? In

-Botero, and A. Narayanan. Shining the floodlights on mobile web tracking - a privacy survey. In Proceedings of Web 2.0 Security and Privacy (W2SP), 2013. [18] Google. Google’s Cookie Matching Protocol. https: //developers.google.com/ad-exchange/rtb/cookie-guide. Online. Sep, 2015. [19] S. Han, J. Jung, and D. Wetherall. A study of third-party tracking by mobile apps in the wild. Technical Report, UWCSE-12-03-01, 2012. [20] T. Kohno, A. Broido, and K. C. Claffy. Remote physical device fingerprinting. Dependable and Secure Computing, IEEE Transactions on, 2(2):93-108, 2005

Temporary Identifier. In Symposium on Network and Distributed System Security (NDSS). ISOC , 2018. [41] T. Kohno, A. Broido, and K. C. Claffy. Remote Physical Device Fingerprinting. IEEE Transactions on Dependable and Secure Computing , 2(2):93–108, 2005. [42] A. Korolova and V. Sharma. Cross-App Tracking via Nearby Bluetooth Low Energy Devices. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy , pages 43–52. ACM, 2018. [43] T. Liebig and A. U. K. Wagoum. Modelling Microscopic Pedestrian Mobility using Bluetooth. In ICAART (2

.0 Security & Privacy (W2SP) Workshop , 2013. [14] Seungyeop Han, Jaeyeon Jung, and David Wetherall. A study of third-party tracking by mobile apps in the wild. Univ. Washington, Tech. Rep. UW-CSE-12-03-01 , 2012. [15] Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, and Giorgio Giacinto. On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms? In Proceedings of the 31st Annual Computer Security Applications Conference , 2015. [16] Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Anirban Mahanti, and

approximations for maximizing submodular set functions i. Mathematical Programming, 14(1):265-294, 1978. [23] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna. Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In IEEE Symposium on S&P, pages 541-555, May 2013. [24] L. Olejnik, C. Castelluccia, and A. Janc. On the uniqueness of web browsing history patterns. Annals of Telecommunications, 69(1), February 2014. [25] A. J. Oliner, A. P. Iyer, I. Stoica, E. Lagerspetz, and S. Tarkoma. Carat: Collaborative energy diagnosis

. Technical Privacy Metrics. ACM Computing Surveys , 51(3):1–38, 2018. [38] Martin Woolley. Bluetooth Technology Protecting Your Privacy, 2015. [39] Qiang Xu, Rong Zheng, Walid Saad, and Zhu Han. Device Fingerprinting in Wireless Networks: Challenges and Opportunities. IEEE Communications Surveys & Tutorials , 18(1):94–104, 2016.

, “Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints,” in Proceedings of the 2012 IEEE Symposium on Security and Privacy, May 2012, pp. 33-47. [15] L. M. Grupp, A. M. Caulfield, J. Coburn, S. Swanson, E. Yaakobi, P. H. Siegel, and J. K. Wolf, “Characterizing flash memory: Anomalies, observations, and applications,” in 42nd Annual IEEE/ACM International Symposium on Microarchitecture, Dec. 2009, pp. 24-33. [16] J. Reardon, D. A. Basin, and S. Capkun, “SoK: Secure Data Deletion,” in Proceedings of the 2013 IEEE

. RFC 4941, Sept. 2007. [19] OpenSignal. LTE Latency: How does it compare to other technologies?, 2014. URL opensignal.com/blog/2014/03/10/lte-latency-how-does-it-compare-to-other-technologies/. [20] OpenSignal. State of Mobile Networks: USA (July 2018), 2018. URL opensignal.com/reports/2018/07/usa/state-ofthe-mobile-network. [21] C. Paasch. Network support for TCP Fast Open, 2016. URL nanog.org/sites/default/files/Paasch_Network_Support.pdf. [22] L. Polcák, J. Jirásek, and P. Matousek. Comment on” Remote Physical Device Fingerprinting”. IEEE Trans. Dependable Sec