메뉴 건너뛰기




Volumn , Issue , 2014, Pages

AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable

Author keywords

[No Author keywords available]

Indexed keywords

SMARTPHONES;

EID: 85005943103     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss/2014.23059     Document Type: Conference Paper
Times cited : (206)

References (71)
  • 2
    • 85180620698 scopus 로고    scopus 로고
    • “Arduino unosetup,” http://www.arduino.cc/en/Main/ArduinoBoardUno/.
    • Arduino unosetup
  • 6
    • 84907406395 scopus 로고    scopus 로고
    • “Apple updates ios to 6.1,” http://www.apple.com/pr/library/2013/01/28Apple-Updates-iOS-to-6-1.html, 2013.
    • (2013) Apple updates ios to 6.1
  • 8
    • 84857196434 scopus 로고    scopus 로고
    • Mems accelerometers
    • March
    • M. Andrejasic, “Mems accelerometers,” Seminar, March 2008.
    • (2008) Seminar
    • Andrejasic, M.1
  • 9
    • 85099180859 scopus 로고    scopus 로고
    • Atmel
    • Atmel, “Atmega328 microcontroller,” http://www.atmel.com/devices/atmega328.aspx.
    • Atmega328 microcontroller
  • 12
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 1049–1060, 2001.
    • (2001) Machine Learning , vol.45 , Issue.1 , pp. 1049-1060
    • Breiman, L.1
  • 13
    • 0030211964 scopus 로고    scopus 로고
    • Bagging predictors
    • L. Breiman, “Bagging predictors,” in Machine Learning, 1996, pp. 123–140.
    • (1996) Machine Learning , pp. 123-140
    • Breiman, L.1
  • 14
    • 84863403768 scopus 로고    scopus 로고
    • Conditional likelihood maximisation: A unifying framework for information theoretic feature selection
    • G. Brown, A. Pocock, M.-J. Zhao, and M. Lujan, “Conditional likelihood maximisation: A unifying framework for information theoretic feature selection,” The Journal of Machine Learning Research, vol. 13, pp. 27–66, 2012.
    • (2012) The Journal of Machine Learning Research , vol.13 , pp. 27-66
    • Brown, G.1    Pocock, A.2    Zhao, M.-J.3    Lujan, M.4
  • 16
    • 84863091977 scopus 로고    scopus 로고
    • On the practicality of motion based keystroke inference attack
    • Springer
    • L. Cai and H. Chen, “On the practicality of motion based keystroke inference attack,” in Trust and Trustworthy Computing. Springer, 2012, pp. 273–290.
    • (2012) Trust and Trustworthy Computing , pp. 273-290
    • Cai, L.1    Chen, H.2
  • 20
    • 0030211964 scopus 로고    scopus 로고
    • Bagging predictors
    • T. Dietterich, “Bagging predictors,” Machine Learning, vol. 24, no. 2, pp. 123–140, 1996.
    • (1996) Machine Learning , vol.24 , Issue.2 , pp. 123-140
    • Dietterich, T.1
  • 21
    • 80053403826 scopus 로고    scopus 로고
    • Ensemble methods in machine learning
    • January
    • T. Dietterich, “Ensemble methods in machine learning,” Multiple Classifier Systems, vol. 45, no. 1, pp. 1–15, January 2000.
    • (2000) Multiple Classifier Systems , vol.45 , Issue.1 , pp. 1-15
    • Dietterich, T.1
  • 22
    • 85042606531 scopus 로고    scopus 로고
    • Manufacturing and reliability challenges with qfn
    • C. T. Dr. February
    • C. T. Dr. Craig Hillman, “Manufacturing and reliability challenges with qfn,” SMTA DC Chapter, vol. 45, no. 1, pp. 1049–1060, February 2009.
    • (2009) SMTA DC Chapter , vol.45 , Issue.1 , pp. 1049-1060
    • Hillman, Craig1
  • 23
    • 77955457549 scopus 로고    scopus 로고
    • How unique is your web browser?
    • Springer
    • P. Eckersley, “How unique is your web browser?” in Privacy Enhancing Technologies. Springer, 2010, pp. 1–18.
    • (2010) Privacy Enhancing Technologies , pp. 1-18
    • Eckersley, P.1
  • 29
    • 34247324807 scopus 로고    scopus 로고
    • Detecting identity-based attacks in wireless networks using signalprints
    • D. Faria and D. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of ACM WiSec, 2006, p. 43-52.
    • (2006) Proceedings of ACM WiSec , pp. 43-52
    • Faria, D.1    Cheriton, D.2
  • 30
    • 85018108881 scopus 로고    scopus 로고
    • Passive data link layer 802.11 wireless device driver fingerprinting
    • Vancouver, BC, Canada, August
    • J. Franklin, D. McCoy, P. Tabriz, and V. Neagoe, “Passive data link layer 802.11 wireless device driver fingerprinting,” in USENIX Security, Vancouver, BC, Canada, August 2006.
    • (2006) USENIX Security
    • Franklin, J.1    McCoy, D.2    Tabriz, P.3    Neagoe, V.4
  • 32
    • 85180632974 scopus 로고    scopus 로고
    • Sequence number-based mac address spoof detection. recent advances in intrusion detection: 8th international symposium
    • Raid, 2006
    • F. Guo and T. Chiueh, “Sequence number-based mac address spoof detection. recent advances in intrusion detection: 8th international symposium,” in 8th International Symposium, Raid, 2005,2006.
    • (2005) 8th International Symposium
    • Guo, F.1    Chiueh, T.2
  • 34
    • 85180634731 scopus 로고    scopus 로고
    • Novel identification of intercepted signals from unknown radio transmitters
    • A. Y. H.C. Choe, C.E. Poole and H. Szu, “Novel identification of intercepted signals from unknown radio transmitters,” SPIE, vol. 2491, no. 504, 2003.
    • (2003) SPIE , vol.2491 , Issue.504
    • Choe, A. Y. H.C.1    Poole, C.E.2    Szu, H.3
  • 35
    • 49049105790 scopus 로고    scopus 로고
    • Radio frequency fingerprinting for intrusion detection in wirless networks
    • M. B. J. Hall and E. Kranakis, “Radio frequency fingerprinting for intrusion detection in wirless networks,” in Defendable and Secure Computing, 2005.
    • (2005) Defendable and Secure Computing
    • Hall, M. B. J.1    Kranakis, E.2
  • 36
    • 70450014575 scopus 로고    scopus 로고
    • Comparing anomaly-detection algorithms for keystroke dynamics
    • IEEE
    • K. S. Killourhy and R. A. Maxion, “Comparing anomaly-detection algorithms for keystroke dynamics,” in Proceedings of IEEE DSN. IEEE, 2009, pp. 125–134.
    • (2009) Proceedings of IEEE DSN , pp. 125-134
    • Killourhy, K. S.1    Maxion, R. A.2
  • 39
    • 84979563757 scopus 로고
    • Specific emitter identification (sei) and classical parameter fusion technology
    • L. Langley, “Specific emitter identification (sei) and classical parameter fusion technology,” in Proceedings of WESCON, 1993.
    • (1993) Proceedings of WESCON
    • Langley, L.1
  • 41
    • 48149099022 scopus 로고    scopus 로고
    • Detecting impersonation attacks in future wireless and mobile networks
    • J. H. M. Barbeau and E. Kranakis, “Detecting impersonation attacks in future wireless and mobile networks,” in Proceedings of MADNES, 2006.
    • (2006) Proceedings of MADNES
    • Barbeau, J. H. M.1    Kranakis, E.2
  • 42
    • 77956202935 scopus 로고    scopus 로고
    • Combining a predictions for accurate recommender systems
    • A. T. M. Jahrer and R. Legenstein, “Combining a predictions for accurate recommender systems,” in Proceedings of ACM SIGKDD, 2010, pp. 693–702.
    • (2010) Proceedings of ACM SIGKDD , pp. 693-702
    • Jahrer, A. T. M.1    Legenstein, R.2
  • 43
    • 80755143996 scopus 로고    scopus 로고
    • (sp) iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers
    • P. Marquardt, A. Verma, H. Carter, and P. Traynor, “(sp) iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers,” in Proceedings of ACM CCS, 2011, pp. 551–562.
    • (2011) Proceedings of ACM CCS , pp. 551-562
    • Marquardt, P.1    Verma, A.2    Carter, H.3    Traynor, P.4
  • 44
    • 77956007436 scopus 로고    scopus 로고
    • Cubic spline interpolation
    • January
    • S. McKinley and M. Levine, “Cubic spline interpolation,” College of the Redwoods, vol. 45, no. 1, pp. 1049–1060, January 1998.
    • (1998) College of the Redwoods , vol.45 , Issue.1 , pp. 1049-1060
    • McKinley, S.1    Levine, M.2
  • 51
    • 37749047975 scopus 로고    scopus 로고
    • Robust location distinction using temporal link signatures
    • N. Patwari and S. K. Kasera, “Robust location distinction using temporal link signatures,” in Proceedings of MobiCon, 2007.
    • (2007) Proceedings of MobiCon
    • Patwari, N.1    Kasera, S. K.2
  • 53
    • 0002964172 scopus 로고    scopus 로고
    • On calibrating measurements of packet transit times
    • V. Paxson, “On calibrating measurements of packet transit times,” in SIGMETRICS, 1998.
    • (1998) SIGMETRICS
    • Paxson, V.1
  • 55
    • 85180626613 scopus 로고    scopus 로고
    • Device identification via analog signal fingerprinting: A matched filter approach
    • M. M. R. Gerdes, T. Daniels and S. Russell, “Device identification via analog signal fingerprinting: A matched filter approach,” in Proceedings of NDSS, 2006.
    • (2006) Proceedings of NDSS
    • Gerdes, M. M. R.1    Daniels, T.2    Russell, S.3
  • 56
    • 85180627261 scopus 로고    scopus 로고
    • Cellular security: better, but foes still lurk
    • IEEE
    • M. Reizenman, “Cellular security: better, but foes still lurk,” in Spectrum, IEEE, 2000.
    • (2000) Spectrum
    • Reizenman, M.1
  • 58
    • 0038343934 scopus 로고    scopus 로고
    • Information fusion in biometrics
    • June
    • A. Ross and A. Jain, “Information fusion in biometrics,” Pattern Recognition Letters, vol. 24, no. 13, pp. 2115–2125, June 2003.
    • (2003) Pattern Recognition Letters , vol.24 , Issue.13 , pp. 2115-2125
    • Ross, A.1    Jain, A.2
  • 60
    • 85180626326 scopus 로고    scopus 로고
    • Estimation and removal of clock skew from network delay measurements
    • D. T. Sue B. Moont, Paul Skelly, “Estimation and removal of clock skew from network delay measurements,” in Proceedings of InfoCom, 1999.
    • (1999) Proceedings of InfoCom
    • Sue, D. T.1    Moont, B.2    Skelly, Paul3
  • 61
    • 60149088227 scopus 로고    scopus 로고
    • Specic emitter identification and verification
    • K. Talbot, P. Duley, and M. Hyatt, “Specic emitter identification and verification,” in Technology Review, 2003.
    • (2003) Technology Review
    • Talbot, K.1    Duley, P.2    Hyatt, M.3
  • 62
    • 26444609828 scopus 로고    scopus 로고
    • Capacity and examples of template-protecting biometric authentication systems
    • P. Tuyls and J. Goseling, “Capacity and examples of template-protecting biometric authentication systems,” in ECCV, 2004.
    • (2004) ECCV
    • Tuyls, P.1    Goseling, J.2
  • 65
    • 84882198584 scopus 로고    scopus 로고
    • Compromising electromagnetic emanations of wired and wireless keyboards
    • M. Vuagnoux and S. Pasini, “Compromising electromagnetic emanations of wired and wireless keyboards,” in Proceedings of USENIX security, 2009, pp. 1–16.
    • (2009) Proceedings of USENIX security , pp. 1-16
    • Vuagnoux, M.1    Pasini, S.2
  • 66
    • 33745636711 scopus 로고    scopus 로고
    • Detecting wireless lan mac address spoofing
    • J. Wright, “Detecting wireless lan mac address spoofing,” White Paper, 2003.
    • (2003) White Paper
    • Wright, J.1
  • 68
    • 85180788168 scopus 로고    scopus 로고
    • Host fingerprinting and tracking on the web: Privacy and security implications
    • T.-F. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, “Host fingerprinting and tracking on the web: Privacy and security implications,” in Proceedings of NDSS, 2012.
    • (2012) Proceedings of NDSS
    • Yen, T.-F.1    Xie, Y.2    Yu, F.3    Yu, R. P.4    Abadi, M.5
  • 70
    • 34247339387 scopus 로고    scopus 로고
    • Securing wireless systems via lower layer enforcements
    • R. M. Z. Li, W. Xu and W. Trappe, “Securing wireless systems via lower layer enforcements,” in Proceedings of ACM Wise, 2006, pp. 33–42.
    • (2006) Proceedings of ACM Wise , pp. 33-42
    • Li, R. M. Z.1    Xu, W.2    Trappe, W.3
  • 71
    • 33745778686 scopus 로고    scopus 로고
    • Keyboard acoustic emanations revisited
    • ACM
    • L. Zhuang, F. Zhou, and J. D. Tygar, “Keyboard acoustic emanations revisited,” in Proceedings of ACM CCS. ACM, 2005, pp. 373–382.
    • (2005) Proceedings of ACM CCS , pp. 373-382
    • Zhuang, L.1    Zhou, F.2    Tygar, J. D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.