메뉴 건너뛰기




Volumn , Issue , 2016, Pages 413-424

Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS; RANDOM PROCESSES; TRACKING (POSITION); WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 84979666706     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2897845.2897883     Document Type: Conference Paper
Times cited : (201)

References (47)
  • 2
    • 84979659923 scopus 로고    scopus 로고
    • Android 6.0 changes. Retrieved from https://developer.android.com/about/versions/ marshmallow/android-6.0-changes.html, 2015.
    • (2015) Android 6.0 Changes
  • 3
    • 84979662144 scopus 로고    scopus 로고
    • O. Abukmail. Wifi Mac Changer. Retrieved from https://play.google.com/store/apps/ details?id=com.wireless.macchanger.
    • Wifi Mac Changer
    • Abukmail, O.1
  • 6
    • 84928027492 scopus 로고    scopus 로고
    • The scrambler attack: A robust physical layer attack on location privacy in vehicular networks
    • B. Bloessl, C. Sommer, F. Dressler, and D. Eckhoff. The scrambler attack: A robust physical layer attack on location privacy in vehicular networks. In ICNC, 2015.
    • (2015) ICNC
    • Bloessl, B.1    Sommer, C.2    Dressler, F.3    Eckhoff, D.4
  • 7
    • 60149092949 scopus 로고    scopus 로고
    • Wireless device identification with radiometric signatures
    • V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In MobiCom, 2008.
    • (2008) MobiCom
    • Brik, V.1    Banerjee, S.2    Gruteser, M.3    Oh, S.4
  • 8
    • 84979659912 scopus 로고    scopus 로고
    • Wi-Fi internet connectivity and privacy: Hiding your tracks on the wireless internet
    • P. O. Carlos J. Bernardos, Juan Carlos Zúńiga. Wi-Fi internet connectivity and privacy: hiding your tracks on the wireless internet. In IEEE CSCN, 2015.
    • (2015) IEEE CSCN
    • Carlos Bernardos, P.O.J.1    Zúńiga, J.C.2
  • 9
    • 84979668284 scopus 로고    scopus 로고
    • Chainfire. Pry-Fi. Retrieved from https://play.google.com/store/apps/ details?id=eu.chainfire.pryfi.
    • Chainfire. Pry-Fi
  • 10
    • 84880172913 scopus 로고    scopus 로고
    • Fingerprinting smartphones remotely via ICMP timestamps
    • M. Cristea and B. Groza. Fingerprinting smartphones remotely via ICMP timestamps. Communications Letters, IEEE, 17(6):1081-1083, 2013.
    • (2013) Communications Letters, IEEE , vol.17 , Issue.6 , pp. 1081-1083
    • Cristea, M.1    Groza, B.2
  • 12
    • 84871231488 scopus 로고    scopus 로고
    • On physical-layer identification of wireless devices
    • B. Danev, D. Zanetti, and S. Capkun. On physical-layer identification of wireless devices. ACM Computing Surveys (CSUR), 45(1):6, 2012.
    • (2012) ACM Computing Surveys (CSUR) , vol.45 , Issue.1 , pp. 6
    • Danev, B.1    Zanetti, D.2    Capkun, S.3
  • 13
    • 84979673965 scopus 로고    scopus 로고
    • Snoopy: Distributed tracking and profiling framework
    • C. Daniel and W. Glenn. Snoopy: Distributed tracking and profiling framework. In 44Con 2012, 2012.
    • (2012) 44Con 2012
    • Daniel, C.1    Glenn, W.2
  • 15
    • 84887772434 scopus 로고    scopus 로고
    • Identifying unique devices through wireless fingerprinting
    • L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee. Identifying unique devices through wireless fingerprinting. In WiSec, 2008.
    • (2008) WiSec
    • Desmond, L.C.C.1    Yuan, C.C.2    Pheng, T.C.3    Lee, R.S.4
  • 18
    • 84962030770 scopus 로고    scopus 로고
    • How talkative is your mobile device? An experimental study of Wi-Fi probe requests
    • J. Freudiger. How talkative is your mobile device? An experimental study of Wi-Fi probe requests. In WiSec, 2015.
    • (2015) WiSec
    • Freudiger, J.1
  • 19
    • 84904131498 scopus 로고    scopus 로고
    • NSA tracking cellphone locations worldwide Snowden documents show
    • B. Gellman and A. Soltani. NSA tracking cellphone locations worldwide, Snowden documents show. The Washington Post, 2013.
    • (2013) The Washington Post
    • Gellman, B.1    Soltani, A.2
  • 20
    • 84857214315 scopus 로고    scopus 로고
    • Channel bounding and MAC protection mechanisms for 802.11ac
    • M. X. Gong, B. Hart, L. Xia, and R. Want. Channel bounding and MAC protection mechanisms for 802.11ac. In GLOBECOM, 2011.
    • (2011) GLOBECOM
    • Gong, M.X.1    Hart, B.2    Xia, L.3    Want, R.4
  • 21
    • 84950333168 scopus 로고    scopus 로고
    • A method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac)
    • F. Gont. A method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac). RFC 7217, 2014.
    • (2014) RFC 7217
    • Gont, F.1
  • 22
    • 84979699005 scopus 로고    scopus 로고
    • No this isn't a scene from minority report. This trash can is stalking you
    • D. Goodin. No, this isn't a scene from minority report. This trash can is stalking you. Ars Technica, 2013.
    • (2013) Ars Technica
    • Goodin, D.1
  • 25
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
    • M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. Mobile Networks and Applications, 10(3):315-325, 2005.
    • (2005) Mobile Networks and Applications , vol.10 , Issue.3 , pp. 315-325
    • Gruteser, M.1    Grunwald, D.2
  • 26
    • 43249097835 scopus 로고    scopus 로고
    • Sequence number-based MAC address spoof detection
    • F. Guo and T. Chiueh. Sequence number-based MAC address spoof detection. In RAID, 2006.
    • (2006) RAID
    • Guo, F.1    Chiueh, T.2
  • 30
    • 78650012686 scopus 로고    scopus 로고
    • Mobile location tracking in metro areas: Malnets and others
    • N. Husted and S. Myers. Mobile location tracking in metro areas: Malnets and others. In CCS, 2010.
    • (2010) CCS
    • Husted, N.1    Myers, S.2
  • 33
    • 60349083720 scopus 로고    scopus 로고
    • On fast and accurate detection of unauthorized wireless access points using clock skews
    • S. Jana and S. K. Kasera. On fast and accurate detection of unauthorized wireless access points using clock skews. In MobiCom, 2008.
    • (2008) MobiCom
    • Jana, S.1    Kasera, S.K.2
  • 37
    • 84873481534 scopus 로고    scopus 로고
    • Tracking unmodified smartphones using Wi-Fi monitors
    • A. B. M. Musa and J. Eriksson. Tracking unmodified smartphones using Wi-Fi monitors. In SenSys, 2012.
    • (2012) SenSys
    • Musa, A.B.M.1    Eriksson, J.2
  • 38
    • 84941261912 scopus 로고    scopus 로고
    • CreepyDOL: Cheap, distributed stalking
    • B. O'Connor. CreepyDOL: Cheap, distributed stalking. In BlackHat, 2013.
    • (2013) BlackHat
    • O'Connor, B.1
  • 41
    • 84978241998 scopus 로고    scopus 로고
    • The NSA's secret role in the U.S. Assassination program
    • J. Scahill and G. Greenwald. The NSA's secret role in the U.S. assassination program. The Intercept, 2014.
    • (2014) The Intercept
    • Scahill, J.1    Greenwald, G.2
  • 43
    • 84879515461 scopus 로고    scopus 로고
    • Who do you sync you are?: Smartphone fingerprinting via application behaviour
    • T. Sẗober, M. Frank, J. Schmitt, and I. Martinovic. Who do you sync you are?: smartphone fingerprinting via application behaviour. In WiSec, 2013.
    • (2013) WiSec
    • Sẗober, T.1    Frank, M.2    Schmitt, J.3    Martinovic, I.4
  • 44
    • 44449164500 scopus 로고    scopus 로고
    • An overview of peak-to-average power ratio reduction techniques for OFDM systems
    • L. Wang and C. Tellambura. An overview of peak-to-average power ratio reduction techniques for OFDM systems. In IEEE ISSPIT, 2006.
    • (2006) IEEE ISSPIT
    • Wang, L.1    Tellambura, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.