Abstract: Fingerprinting 802.11 devices has been proposed to identify devices in order to mitigate IEEE 802.11 weak-nesses. However, important limitations prevent any real deployment. On the first hand, fingerprinting has a low accuracy when the devices have similar hardware and software. On the second hand, attackers may forge signatures to impersonate devices. We propose Diversity, a cooperative fingerprinting approach that improves accuracy of existing fingerprinting methods while relying only on off-the-shelf hardware. Diversity improves fingerprinting up to the reliable individual identification of identical 802.11 devices. This approach modifies the signature of devices by modifying slightly their traffic attributes. We evaluate Diver...
As wireless devices become increasingly pervasive and essential, they are becoming both a target for...
International audienceSpoofing attacks are generally difficult to detect and can have potentially ha...
Fingerprinting is an important technique for identifying and characterizing devices on a network in ...
The research presented in this thesis provides the reader with a set of algorithms and techniques th...
Abstract—802.11 device fingerprinting is the action of char-acterizing a target device through its w...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
In the following thesis, we propose a set of techniques that allow us to create unique signatures fo...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
AbstractEasy associations with wireless access points (APs) give users temporal and quick access to ...
Abstract—In this paper, we introduce GTID, a technique that passively fingerprints wireless devices ...
Wireless local area networks are particularly vulnerable to cyber attacks due to their contested tra...
The ubiquity of 802.11 devices and networks enables anyone to track our every move with alarming eas...
Wireless network suffers from security threats which are of different nature. One of the most signif...
Fingerprinting techniques aim to identify objects such as devices, data, users, or even attacks, bas...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new securi...
As wireless devices become increasingly pervasive and essential, they are becoming both a target for...
International audienceSpoofing attacks are generally difficult to detect and can have potentially ha...
Fingerprinting is an important technique for identifying and characterizing devices on a network in ...
The research presented in this thesis provides the reader with a set of algorithms and techniques th...
Abstract—802.11 device fingerprinting is the action of char-acterizing a target device through its w...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
In the following thesis, we propose a set of techniques that allow us to create unique signatures fo...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
AbstractEasy associations with wireless access points (APs) give users temporal and quick access to ...
Abstract—In this paper, we introduce GTID, a technique that passively fingerprints wireless devices ...
Wireless local area networks are particularly vulnerable to cyber attacks due to their contested tra...
The ubiquity of 802.11 devices and networks enables anyone to track our every move with alarming eas...
Wireless network suffers from security threats which are of different nature. One of the most signif...
Fingerprinting techniques aim to identify objects such as devices, data, users, or even attacks, bas...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new securi...
As wireless devices become increasingly pervasive and essential, they are becoming both a target for...
International audienceSpoofing attacks are generally difficult to detect and can have potentially ha...
Fingerprinting is an important technique for identifying and characterizing devices on a network in ...