Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243796
|View full text |Cite
|
Sign up to set email alerts
|

Clock Around the Clock

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 53 publications
(9 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…Cheng et al [20] relied on the hardware differences between the CPU modules of different devices to detect and identify different devices; Park et al [21] distinguish different devices based on the inherent characteristics of hardware for embedded systems; Sanchez-Rola et al [22] compute a hardware fingerprinting, based on timing the execution of sequences of instructions readily available in API functions.…”
Section: Traditional Detection Methodsmentioning
confidence: 99%
“…Cheng et al [20] relied on the hardware differences between the CPU modules of different devices to detect and identify different devices; Park et al [21] distinguish different devices based on the inherent characteristics of hardware for embedded systems; Sanchez-Rola et al [22] compute a hardware fingerprinting, based on timing the execution of sequences of instructions readily available in API functions.…”
Section: Traditional Detection Methodsmentioning
confidence: 99%
“…And they propose FPSelect, an attribute selection framework which allows users to justify their browser fingerprinting probes for authentication. Sanchez-Rola et al [14] show a new method of computing a hardware fingerprinting, which utilizing time of the execution of sequences of instructions in API functions. Li [15] performed a large-scale measurement for millions of fingerprints to figure out fingerprint dynamics in a real-world website and they found that state-of-the-art fingerprinting tools performs poorly in real-world setting.…”
Section: Related Workmentioning
confidence: 99%
“…Hardware Fingerprints are widely explored on various platforms such as mobile, PC, and IoT devices, to distinguish and track devices [37], [52], [65] or to authenticate devices [36], [26], [56], [24], [21], [22]. Unfortunately, most of these fingerprinting features require special hardware support, such as GPU [37], [52], mobile sensors [65], [32], and NADA flash [60], [24], which are absent in MCU-based embedded devices. For the approaches target IoT devices, HODOR [36] and [26] employ RFID signal features to fingerprint devices which is not a general solution for other kinds of IoT devices.…”
Section: Related Workmentioning
confidence: 99%