Essays about: "Fingerprint Attack"

Showing result 1 - 5 of 8 essays containing the words Fingerprint Attack.

  1. 1. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Christoffer Sandquist; Jon-Erik Ersson; [2023]
    Keywords : Data collection; Website fingerprinting; dataset; traffic analysis; VPN; encrypted traffic; machine learning; deep learning; network measurements; twitch; Datainsamling; Profilering av hemsidor; dataset; trafikanalys; VPN; krypterad trafik; maskininlärning; djupinlärning; nätverksmätningar; twitch;

    Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE

  2. 2. Which News Articles are You Reading? : Using Fingerprinting to Attack Internal Pages of News Websites

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Martin Lindblom; [2021]
    Keywords : Fingerprint Attack; Privacy; Transport Layer Security; TLS; Real-World Scenario; News Websites; News Articles; Proxy-Less Labelling Heuristic; Transmission Control Protocol; TCP; Internal Pages; Automatic Data Collection;

    Abstract : When performing fingerprinting attacks against websites in a controlled environment astudy may achieve very promising results. However, these can be misleading as the closedworld setting may not accurately represent the real-world. READ MORE

  3. 3. Designing a Physical Unclonable Function for Cryptographic Hardware

    University essay from Linköpings universitet/Institutionen för teknik och naturvetenskap; Linköpings universitet/Tekniska fakulteten

    Author : Ludwig Bergfalck; Johannes Engström; [2021]
    Keywords : Hardware-based keyseed; Tamper protection; Physical Unclonable Function PUF ; Sensing mesh enclosure; Differential capacitance measurements;

    Abstract : Hardware Security Modules (HSMs) are embedded systems that provide a physically secure data storage and handling environment. This master thesis evaluates an HSM method incorporating cryptographic key generation, key management, and tamper protection. READ MORE

  4. 4. Digital incursion: Breaching the android lock screen and liberating data

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Tim Oskarsson; [2021]
    Keywords : Android forensics; Mobile forensics; Memory forensics; Device access; PIN; Pattern; Biometrics; Android Debug Bridge; TWRP; Frida.;

    Abstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE

  5. 5. Secure hypervisor versus trusted execution environment : Security analysis for mobile fingerprint identification applications

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Anton Sundblad; Gustaf Brunberg; [2017]
    Keywords : tee; information security; hypervisor; attack trees; fault trees;

    Abstract : Fingerprint identification is becoming increasingly popular as a means of authentication for handheld devices of different kinds. In order to secure such an authentication solution it is common to use a TEE implementation. READ MORE