The ability to track users’ activities across different websites and visits is a key tool in advertising and surveillance. The HTML5 DeviceMotion interface creates a new opportunity for such tracking via fingerprinting of smartphone motion sensors. We study the feasibility of carrying out such fingerprinting under real-world constraints and on a large scale. In particular, we collect measurements from several hundred users under realistic scenarios and show that the state-of-the-art techniques provide very low accuracy in these settings. We then improve fingerprinting accuracy by changing the classifier as well as incorporating auxiliary information. We also show how to perform fingerprinting in an open-world scenario where one must disting...
Device fingerprinting aims to generate a distinctive signature, or fingerprint, that uniquely identi...
The overall network traffic patterns generated by today’s smartphones result from the typically larg...
The growing trend of using smartphones as personal computing platforms to access and store private i...
The widespread use of smartphones in our everyday life gives rise to privacy concerns. Fingerprintin...
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robust...
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robust...
We demonstrate how the multitude of sensors on a smart-phone can be used to construct a reliable har...
The widespread use of smartphones in our everyday life gives rise to privacy concerns. Fingerprintin...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
4Co-primary authors Abstract—As mobile begins to overtake the fixed Internet access, ad networks hav...
Device fingerprinting, similar to that of humans, if done well, can provide a convenient form of ide...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
Device fingerprinting aims to generate a distinctive signature, or fingerprint, that uniquely identi...
The overall network traffic patterns generated by today’s smartphones result from the typically larg...
The growing trend of using smartphones as personal computing platforms to access and store private i...
The widespread use of smartphones in our everyday life gives rise to privacy concerns. Fingerprintin...
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robust...
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robust...
We demonstrate how the multitude of sensors on a smart-phone can be used to construct a reliable har...
The widespread use of smartphones in our everyday life gives rise to privacy concerns. Fingerprintin...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
4Co-primary authors Abstract—As mobile begins to overtake the fixed Internet access, ad networks hav...
Device fingerprinting, similar to that of humans, if done well, can provide a convenient form of ide...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
Device fingerprinting aims to generate a distinctive signature, or fingerprint, that uniquely identi...
The overall network traffic patterns generated by today’s smartphones result from the typically larg...
The growing trend of using smartphones as personal computing platforms to access and store private i...