Abstract—The hardware identifiers of common wireless pro-tocols can be exploited by adversaries for both tracking and physical device association. Rather than examining hardware identifiers in isolation, we observe that many modern devices are equipped with multiple wireless interfaces of different physical types, e.g. GSM and 802.11, suggesting that there exists utility in cross-protocol hardware identifier correlation. This research empir-ically examines the feasibility of such cross-protocol association, concentrating on correlating a GSM hardware identifier to that of the 802.11 hardware identifier on the same device. Our dataset includes 18 distinct mobile devices, with identifiers collected over time at disparate locations. We develop...
The research presented in this thesis provides the reader with a set of algorithms and techniques th...
International audienceBluetooth devices naturally emit many public signals. It opens new paths for p...
This archive contains the datasets used for the experiments in the paper "Non-cooperative 802.11 MAC...
Abstract: Fingerprinting 802.11 devices has been proposed to identify devices in order to mitigate I...
In this work, we study the physical-layer identification of GSM devices. For our exploration, we bui...
International audienceActive service discovery in Wi-Fi involves wireless stations broadcasting thei...
Abstract—802.11 device fingerprinting is the action of char-acterizing a target device through its w...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
International audienceActive service discovery in Wi-Fi involves wireless stations broadcasting thei...
In the following thesis, we propose a set of techniques that allow us to create unique signatures fo...
Abstract—In this paper, we introduce GTID, a technique that passively fingerprints wireless devices ...
We design, implement, and evaluate a technique to identify the source network interface card (NIC) o...
Secure wireless device identification is necessary if we want to ensure that any transmitted data re...
The ubiquity of 802.11 devices and networks enables anyone to track our every move with alarming eas...
The research presented in this thesis provides the reader with a set of algorithms and techniques th...
International audienceBluetooth devices naturally emit many public signals. It opens new paths for p...
This archive contains the datasets used for the experiments in the paper "Non-cooperative 802.11 MAC...
Abstract: Fingerprinting 802.11 devices has been proposed to identify devices in order to mitigate I...
In this work, we study the physical-layer identification of GSM devices. For our exploration, we bui...
International audienceActive service discovery in Wi-Fi involves wireless stations broadcasting thei...
Abstract—802.11 device fingerprinting is the action of char-acterizing a target device through its w...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
International audienceActive service discovery in Wi-Fi involves wireless stations broadcasting thei...
In the following thesis, we propose a set of techniques that allow us to create unique signatures fo...
Abstract—In this paper, we introduce GTID, a technique that passively fingerprints wireless devices ...
We design, implement, and evaluate a technique to identify the source network interface card (NIC) o...
Secure wireless device identification is necessary if we want to ensure that any transmitted data re...
The ubiquity of 802.11 devices and networks enables anyone to track our every move with alarming eas...
The research presented in this thesis provides the reader with a set of algorithms and techniques th...
International audienceBluetooth devices naturally emit many public signals. It opens new paths for p...
This archive contains the datasets used for the experiments in the paper "Non-cooperative 802.11 MAC...