Paper published in a book (Scientific congresses, symposiums and conference proceedings)
A Formalization of Fingerprinting Techniques
Lanze, Fabian; Panchenko, Andriy; Engel, Thomas
2015 • In Proceedings of the IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP 2015), held in conjunction with IEEE TrustCom 2015
Lanze, Fabian ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Panchenko, Andriy ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Engel, Thomas ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
External co-authors :
no
Language :
English
Title :
A Formalization of Fingerprinting Techniques
Publication date :
August 2015
Event name :
IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP 2015), held in conjunction with IEEE TrustCom 2015
Event place :
Helsinki, Finland
Event date :
from 20-08-2015 to 22-08-2015
Main work title :
Proceedings of the IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP 2015), held in conjunction with IEEE TrustCom 2015
The Fingerprint Sourcebook, International Association for Identification, U.S. Department of Justice, July 2011. [Online]. Available: https://www.ncjrs.gov/pdffiles1/nij/225320.pdf
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Transactions on Information Theory, vol. 44, no. 5, 1998.
D. Boneh, A. Kiayias, and H. Montgomery, "Robust fingerprinting codes: A near optimal construction," in Proceedings of the tenth Annual ACM Workshop on Digital Rights Management (DRM'10). Chicago, Illinois, USA: ACM, October 2010, pp. 3-12.
A. E. Caldwell, H.-J. Choi, A. B. Kahng, S. Mantik, M. Potkonjak, G. Qu, and J. L. Wong, "Effective iterative techniques for fingerprinting design ip," IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems, vol. 23, no. 2, 2004.
P. Cano, E. Batlle, T. Kalker, and J. Haitsma, "A review of algorithms for audio fingerprinting," in IEEE Workshop on Multimedia Signal Processing. IEEE, 2002, pp. 169-173.
A. L. Varna, S. He, A. Swaminathan, and M. Wu, "Fingerprinting compressed multimedia signals," IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, 2009.
H. Liu, H. Darabi, P. Banerjee, and J. Liu, "Survey of wireless indoor positioning techniques and systems," IEEE Transactions on Systems, Man, and Cybernetics, vol. 37, no. 6, 2007.
M. Azizyan, I. Constandache, and R. R. Choudhury, "Surroundsense: Mobile phone localization via ambience fingerprinting," in Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MobiCom'09). Beijing, China: ACM, September 2009.
N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna, "Cookieless monster: Exploring the ecosystem of web-based device fingerprinting," in Proceedings of the 2013 IEEE Symposium on Security and Privacy (S&P). Berkeley, CA, USA: IEEE, May 2013.
K. Mowery and H. Shacham, "Pixel perfect: Fingerprinting canvas in html5," in Proceedings of Web 2.0 Security &Privacy 2012 (W2SP'12). San Francisco, CA, USA: IEEE Computer Society, May 2012.
G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz, "The web never forgets: Persistent tracking mechanisms in the wild," in Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS'14). Scottsdale, Arizona, USA: ACM, November 2014.
T. Stber, M. Frank, J. Schmitt, and I. Martinovic, "Who do you sync you are? smartphone fingerprinting via application behaviour," in Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'13). Budapest, Hungary: ACM, April 2013.
S. Bratus, C. Cornelius, D. Kotz, and D. Peebles, "Active behavioral fingerprinting of wireless devices," in Proceedings of the First ACM Conference on Wireless Network Security (WiSec'08), Alexandria, Virginia, USA, March 2008.
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in Proceedings of the 14th ACM International Conference on Mobile Computing and Networking (MobiCom '08), San Francisco, CA, USA, September 2008.
K. Gao, C. Corbett, and R. Beyah, "A passive approach to wireless device fingerprinting," in Proceedings of the 40th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '10). IEEE Computer Society, 2010, pp. 383-392.
F. Lanze, A. Panchenko, B. Braatz, and A. Zinnen, "Clock skew based remote device fingerprinting demystified," in Proceedings of the 55th International IEEE Global Communications Conference (GLOBECOM '12). Anaheim, CA, USA: IEEE Computer Society, December 2012, pp. 813-819.
F. Lanze, A. Panchenko, B. Braatz, and T. Engel, "Letting the puss in boots sweat: Detecting fake access points using dependency of clock skews on temperature," in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (AsiaCCS 2014). Kyoto, Japan: ACM, June 2014, pp. 3-14.
Y. He, J. Tian, X. Luo, and T. Zhang, "Image enhancement and minutiae matching in fingerprint verification," Pattern Recognition Letters, vol. 24, pp. 1349-1360, 2003.
D. Maio and D. Maltoni, "Direct gray-scale minutiae detection in fingerprints," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, pp. 27-40, January 1997.
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, 2nd ed. Springer London, 2009.
J. Galbally-Herrero, J. Fierrez-Aguilar, J. Rodriguez-Gonzalez, F. Alonso-Fernandez, J. Ortega-Garcia, and M. Tapiador, "On the vulnerability of fingerprint verification systems to fake fingerprints attacks," in Proceedings of the 40th Annual IEEE Carnahan Conferences Security Technology, 2006.
C. Barral and A. Tria, "Fake fingers in fingerprint recognition: Glycerin supersedes gelatin," Formal to Practical Security, Lecture Notes in Computer Science, vol. 5458, pp. 57-69, 2009.
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The secondgeneration onion router," in Proceedings of the 13th USENIX Security Symposium. San Diego, CA, USA: USENIX Association, 2004, pp. 303-320.
M. Liberatore and B. N. Levine, "Inferring the source of encrypted http connections," in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, VA, USA, October 2006.
D. Herrmann, R. Wendolsky, and H. Federrath, "Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier," in Proceedings of the 2009 ACM CCS Workshop on Cloud Computing Security (CCSW'09). Chicago, Illinois, USA: ACM Press, 2009, pp. 31-42.
A. Panchenko, L. Niessen, A. Zinnen, and T. Engel, "Website fingerprinting in onion routing based anonymization networks," in Proceedings of the 18th ACM Computer and Communications Security (ACM CCS) Workshop on Privacy in the Electronic Society (WPES 2011). Chicago, Illinois, USA: ACM Press, October 2011.
K. P. Dyer, S. Coull, T. Ristenpart, and T. Shrimpton, "Peek-A-boo, i still see you: Why efficient traffic analysis countermeasures fail," in Proceedings of the 2012 IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, CA, USA, 2012.
X. Cai, X. Zhang, B. Joshi, and R. Johnson, "Touching from a distance: Website fingerprinting attacks and defenses," in Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), Raleigh, NC, USA, October 2012.
T. Wang, X. Cai, R. Nithyanand, R. Johnson, and I. Goldberg, "Effective attacks and provable defenses for website fingerprinting," in Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 2014.