International audienceMAC address randomization is a common privacy protection measure deployed in major operating systems today.It is used to prevent user-tracking with probe requests that are transmitted during IEEE 802.11 network scans. We present an attack to defeat MAC address randomization through observation of the timings of the network scans with an off-the-shelf Wi-Fi interface. This attack relies on a signature based on inter-frame arrival times of probe requests, which is used to group together frames coming from the same device although they use distinct MAC addresses. We propose several distance metrics based on timing and use them together with an incremental learning algorithm in order to group frames. We show that these sig...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
Journal ArticleWe explore the use of clock skew of a wireless local area network access point (AP) a...
International audienceMAC address randomization is a common privacy protection measure deployed in m...
International audienceMAC address randomization is a common privacy protection measure deployed in m...
MAC address randomization is a common privacy protection measure deployed in major operating systems...
MAC address randomization is a common privacy protection measure deployed in major operating systems...
International audienceWe present several novel techniques to track (unassociated) mobile devices by ...
International audienceWe present several novel techniques to track (unassociated) mobile devices by ...
We present several novel techniques to track (unassociated) mobile devices by abusing features of th...
The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devic...
The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devic...
Mobile device manufacturers and operating system developers increasingly deploy MAC address randomiz...
International audienceThis work is about wireless communications technologies embedded in portable d...
International audienceThis work is about wireless communications technologies embedded in portable d...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
Journal ArticleWe explore the use of clock skew of a wireless local area network access point (AP) a...
International audienceMAC address randomization is a common privacy protection measure deployed in m...
International audienceMAC address randomization is a common privacy protection measure deployed in m...
MAC address randomization is a common privacy protection measure deployed in major operating systems...
MAC address randomization is a common privacy protection measure deployed in major operating systems...
International audienceWe present several novel techniques to track (unassociated) mobile devices by ...
International audienceWe present several novel techniques to track (unassociated) mobile devices by ...
We present several novel techniques to track (unassociated) mobile devices by abusing features of th...
The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devic...
The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devic...
Mobile device manufacturers and operating system developers increasingly deploy MAC address randomiz...
International audienceThis work is about wireless communications technologies embedded in portable d...
International audienceThis work is about wireless communications technologies embedded in portable d...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
Journal ArticleWe explore the use of clock skew of a wireless local area network access point (AP) a...