Essays about: "Device Fingerprinting"

Showing result 1 - 5 of 9 essays containing the words Device Fingerprinting.

  1. 1. Impact of fixed-rate fingerprinting defense on cloud gaming experience

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Kent Thang; Adam Nyberg; [2023]
    Keywords : cloud gaming; QoE; QoS; proxy; fingerprinting defense; website fingerprinting attack;

    Abstract : Cloud gaming has emerged as a popular solution to meet the increasing hardware de-mands of modern video games, allowing players with dated or non-sufficient hardwareto access high-quality gaming experiences. However, the growing reliance on cloud ser-vices has led to heightened concerns regarding user privacy and the risk of fingerprintingattacks. READ MORE

  2. 2. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  3. 3. Generic Encrypted Traffic Identification using Network Grammar : A Case Study in Passive OS Fingerprinting

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Lukas Rajala; Kevin Scott; [2022]
    Keywords : Passive OS Fingerprinting; Encrypted Traffic Identification; Automated Traffic Analysis; Machine Learning; Supervised Learning; Networks; Packet Classification; Security and Privacy;

    Abstract : The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attacking vulnerable devices on government or private company networks. The devices attacked are often forgotten computers that run operating systems with known exploits. READ MORE

  4. 4. A Study on Fingerprinting of Locally Assigned MAC-Addresses

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Karl-Johan Djervbrant; Andreas Häggström; [2019]
    Keywords : MAC-Address Randomization; Probe Request; Passive Probe Request Analysis; Control Frame Attacks; Computer Science; Network; IEEE 802.11; WiFi; Tracking; Counting.;

    Abstract : The number of WiFi Devices is increasing every day, most people traveling hasa device with a WiFi network card enabled. This is something EffectSoft AB in Halmstad utilizes in their service Flow, to track and count devices. READ MORE

  5. 5. On Statistical Properties of Arbiter Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Phillip Gajland; [2018]
    Keywords : PUF; Boolean function; function distribution; arbiter path; digital fingerprint; secure key storage; cryptography; system security; hardware security.;

    Abstract : The growing interest in the Internet of Things (IoT) has led to predictions claiming that by 2020 we can expect to be surrounded by 50 billion Internet connected devices. With more entry points to a network, adversaries can potentially use IoT devices as a stepping stone for attacking other devices connected to the network or the network itself. READ MORE