-
3
-
-
84910619704
-
-
Apple set deadline for UDID. http://www.engadget.com/2013/03/21/apple-sets-a-may-1st-cutoff-for-appsubmissions-that-use-udid/.
-
Apple Set Deadline for UDID
-
-
-
4
-
-
84910669853
-
-
F-secure Mobile Treat Report. https://www.f-secure.com/static/doc/labs-global/Research/Mobile-Threat-Report-Q1-2013.pdf.
-
F-secure Mobile Treat Report
-
-
-
5
-
-
84910653293
-
-
Frequency response of 3 speakers. http://community. edmdistrict.com/showthread.php?7944-Beats-Studios-doesn-t-sound-right.
-
Frequency Response of 3 Speakers
-
-
-
7
-
-
84910645845
-
-
iBeacon. http://en.wikipedia.org/wiki/IBeacon.
-
IBeacon
-
-
-
9
-
-
84910636371
-
-
Spread spectrum. http: //en.wikipedia.org/wiki/Spread-spectrum.
-
Spread Spectrum
-
-
-
11
-
-
84910632818
-
-
UUID of Android. http://developer.android.com/reference/java/util/UUID.html.
-
UUID of Android
-
-
-
12
-
-
84910624474
-
-
Wifi Positioning System. http://en.wikipedia.org/wiki/Wi-Fi-positioning-system.
-
Wifi Positioning System
-
-
-
13
-
-
77952326651
-
On the reliability of wireless fingerprinting using clock skews
-
ACM
-
C. Arackaparambil, S. Bratus, A. Shubina, and D. Kotz. On the reliability of wireless fingerprinting using clock skews. In Proceedings of the third ACM conference on Wireless network security, pages 169-174. ACM, 2010.
-
(2010)
Proceedings of the Third ACM Conference on Wireless Network Security
, pp. 169-174
-
-
Arackaparambil, C.1
Bratus, S.2
Shubina, A.3
Kotz, D.4
-
14
-
-
84862128563
-
User tracking on the web via cross-browser fingerprinting
-
Springer
-
K. Boda, Á. M. Földes, G. G. Gulyás, and S. Imre. User tracking on the web via cross-browser fingerprinting. In Information Security Technology for Applications, pages 31-46. Springer, 2012.
-
(2012)
Information Security Technology for Applications
, pp. 31-46
-
-
Boda, K.1
Földes, A.M.2
Gulyás, G.G.3
Imre, S.4
-
17
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
ACM
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 116-127. ACM, 2008.
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
20
-
-
56749098358
-
Identifying unique devices through wireless fingerprinting
-
ACM
-
L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee. Identifying unique devices through wireless fingerprinting. In Proceedings of the first ACM conference on Wireless network security, pages 46-55. ACM, 2008.
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security
, pp. 46-55
-
-
Desmond, L.C.C.1
Yuan, C.C.2
Pheng, T.C.3
Lee, R.S.4
-
21
-
-
84936788440
-
Accelprint: Imperfections of accelerometers make smartphones trackable
-
NDSS
-
S. Dey, N. Roy, W. Xu, R. R. Choudhury, and S. Nelakuditi. Accelprint: Imperfections of accelerometers make smartphones trackable. In Proceedings of the 20th Annual Network and Distributed System Security Symposium (Feb 2014), NDSS, volume 14, 2014.
-
(2014)
Proceedings of the 20th Annual Network and Distributed System Security Symposium (Feb 2014)
, vol.14
-
-
Dey, S.1
Roy, N.2
Xu, W.3
Choudhury, R.R.4
Nelakuditi, S.5
-
22
-
-
77955457549
-
How unique is your web browser?
-
Springer
-
P. Eckersley. How unique is your web browser? In Privacy Enhancing Technologies, pages 1-18. Springer, 2010.
-
(2010)
Privacy Enhancing Technologies
, pp. 1-18
-
-
Eckersley, P.1
-
23
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. In Proc. 15th USENIX Security Symposium, pages 167-178, 2006.
-
(2006)
Proc. 15th USENIX Security Symposium
, pp. 167-178
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.V.5
Sicker, D.6
-
24
-
-
15044355327
-
Similarity search in high dimensions via hashing
-
A. Gionis, P. Indyk, R. Motwani, et al. Similarity search in high dimensions via hashing. In VLDB, volume 99, pages 518-529, 1999.
-
(1999)
VLDB
, vol.99
, pp. 518-529
-
-
Gionis, A.1
Indyk, P.2
Motwani, R.3
-
26
-
-
36549030872
-
Understanding and preventing network device fingerprinting
-
L. G. Greenwald and T. J. Thomas. Understanding and preventing network device fingerprinting. Bell Labs Technical Journal, 12(3):149-166, 2007.
-
(2007)
Bell Labs Technical Journal
, vol.12
, Issue.3
, pp. 149-166
-
-
Greenwald, L.G.1
Thomas, T.J.2
-
27
-
-
84863297774
-
Accomplice: Location inference using accelerometers on smartphones
-
IEEE
-
J. Han, E. Owusu, L. T. Nguyen, A. Perrig, and J. Zhang. Accomplice: Location inference using accelerometers on smartphones. In Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on, pages 1-9. IEEE, 2012.
-
(2012)
Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on
, pp. 1-9
-
-
Han, J.1
Owusu, E.2
Nguyen, L.T.3
Perrig, A.4
Zhang, J.5
-
30
-
-
35048881618
-
"Are you with me?"-using accelerometers to determine if two devices are carried by the same person
-
J. Lester, B. Hannaford, and G. Borriello. "are you with me?"-using accelerometers to determine if two devices are carried by the same person. In Pervasive, pages 33-50, 2004.
-
(2004)
Pervasive
, pp. 33-50
-
-
Lester, J.1
Hannaford, B.2
Borriello, G.3
-
31
-
-
33744736314
-
Digital camera identification from sensor pattern noise
-
J. Lukas, J. Fridrich, and M. Goljan. Digital camera identification from sensor pattern noise. Information Forensics and Security, IEEE Transactions on, 1(2):205-214, 2006.
-
(2006)
Information Forensics and Security IEEE Transactions on
, vol.1
, Issue.2
, pp. 205-214
-
-
Lukas, J.1
Fridrich, J.2
Goljan, M.3
-
33
-
-
84881232179
-
Fingerprinting information in javascript implementations
-
K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham. Fingerprinting information in javascript implementations. In Proceedings of Web, volume 2, 2011.
-
(2011)
Proceedings of Web
, vol.2
-
-
Mowery, K.1
Bogenreif, D.2
Yilek, S.3
Shacham, H.4
-
34
-
-
84869597852
-
Probabilistic infrastructureless positioning in the pocket
-
Springer
-
L. T. Nguyen and Y. Zhang. Probabilistic infrastructureless positioning in the pocket. In Mobile Computing, Applications, and Services, pages 311-330. Springer, 2012.
-
(2012)
Mobile Computing, Applications, and Services
, pp. 311-330
-
-
Nguyen, L.T.1
Zhang, Y.2
-
35
-
-
84881238242
-
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
-
IEEE
-
N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna. Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 541-555. IEEE, 2013.
-
(2013)
Security and Privacy (SP 2013 IEEE Symposium on
, pp. 541-555
-
-
Nikiforakis, N.1
Kapravelos, A.2
Joosen, W.3
Kruegel, C.4
Piessens, F.5
Vigna, G.6
-
37
-
-
85032771294
-
Locality-sensitive hashing for finding nearest neighbors [lecture notes]
-
M. Slaney and M. Casey. Locality-sensitive hashing for finding nearest neighbors [lecture notes]. Signal Processing Magazine IEEE, 25(2):128-131, 2008.
-
(2008)
Signal Processing Magazine IEEE
, vol.25
, Issue.2
, pp. 128-131
-
-
Slaney, M.1
Casey, M.2
-
39
-
-
77957951141
-
Flash cookies and privacy
-
A. Soltani, S. Canty, Q. Mayo, L. Thomas, and C. J. Hoofnagle. Flash cookies and privacy. In AAAI Spring Symposium: Intelligent Information Privacy Management, 2010.
-
(2010)
AAAI Spring Symposium: Intelligent Information Privacy Management
-
-
Soltani, A.1
Canty, S.2
Mayo, Q.3
Thomas, L.4
Hoofnagle, C.J.5
-
41
-
-
85180529696
-
Adnostic: Privacy preserving targeted advertising
-
V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas. Adnostic: Privacy preserving targeted advertising. In NDSS, 2010.
-
(2010)
NDSS
-
-
Toubiana, V.1
Narayanan, A.2
Boneh, D.3
Nissenbaum, H.4
Barocas, S.5
-
43
-
-
84871572697
-
Android privacy
-
IEEE
-
T.-E. Wei, A. B. Jeng, H.-M. Lee, C.-H. Chen, and C.-W. Tien. Android privacy. In Machine Learning and Cybernetics (ICMLC), 2012 International Conference on, volume 5, pages 1830-1837. IEEE, 2012.
-
(2012)
Machine Learning and Cybernetics (ICMLC), 2012 International Conference on
, vol.5
, pp. 1830-1837
-
-
Wei, T.-E.1
Jeng, A.B.2
Lee, H.-M.3
Chen, C.-H.4
Tien, C.-W.5
-
45
-
-
84889000328
-
Identity, location, disease and more: Inferring your secrets from android public resources
-
ACM
-
X. Zhou, S. Demetriou, D. He, M. Naveed, X. Pan, X. Wang, C. A. Gunter, and K. Nahrstedt. Identity, location, disease and more: inferring your secrets from android public resources. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 1017-1028. ACM, 2013.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 1017-1028
-
-
Zhou, X.1
Demetriou, S.2
He, D.3
Naveed, M.4
Pan, X.5
Wang, X.6
Gunter, C.A.7
Nahrstedt, K.8
|