How talkative is your mobile device? An experimental study of Wi-Fi probe requests

J Freudiger - Proceedings of the 8th ACM Conference on Security & …, 2015 - dl.acm.org
… have identified privacy hazards associated with Wi-Fi probe requests, such as leaking past
devices continue to use Wi-Fi probe requests. In this work, we quantify Wi-Fi probe requests’ …

Localization of WiFi devices using probe requests captured at unmanned aerial vehicles

V Acuna, A Kumbhar, E Vattapparamban… - 2017 IEEE wireless …, 2017 - ieeexplore.ieee.org
… based on the measured probe requests, we are interested to identify the zone where the
WiFi device is located. Our experimental results show that the WiFi device can be detected in …

Mobile device detection through WiFi probe request analysis

L Oliveira, D Schneider, J De Souza, W Shen - IEEE Access, 2019 - ieeexplore.ieee.org
… The main contributions of this present study include the following: the design of a WiFi
presence detection device called Sherlock, which is specialized in detecting probe requests; and …

Linking wireless devices using information contained in Wi-Fi probe requests

M Cunche, MA Kaafar, R Boreli - Pervasive and Mobile Computing, 2014 - Elsevier
… wireless devices. Specifically, we discuss how leveraging potential ordered probe requests
and … can be used to establish relationship between Wi-Fi devices. Furthermore, we provide in …

I know who you will meet this evening! linking wireless devices using wi-fi probe requests

M Cunche, MA Kaafar, R Boreli - … on a World of Wireless, Mobile …, 2012 - ieeexplore.ieee.org
… exploit the device’s Wi-Fi fingerprint to group devices and the owners of those devices. The
… This work demonstrates yet another privacy breach allowed by the 802.11 probe requests, …

Is there WiFi yet? How aggressive probe requests deteriorate energy and throughput

X Hu, L Song, D Van Bruggen, A Striegel - Proceedings of the 2015 …, 2015 - dl.acm.org
… mobile devices continue to unashamedly probe despite never finding … Probe Requests in
the ultra-dense venue (affirmed by [4]) as well as exploring the patterns of the various devices

A dataset of labelled device Wi-Fi probe requests for MAC address de-randomization

L Pintor, L Atzori - Computer Networks, 2022 - Elsevier
probe requests from a single device, we verified that the anechoic chamber shielded any
Wi-Fi … We collected probe requests from unknown devices and management packets of the …

Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests

A Di Luzio, A Mei, J Stefa - IEEE INFOCOM 2016-The 35th …, 2016 - ieeexplore.ieee.org
… the idea of exploiting WiFi probe requests to de-anonymize the … more than 11M of probe
requests collected in scenarios that … called WiFi probe request [1] that our devices periodically …

Location privacy and changes in wifi probe request based connection protocols usage through years

A Dagelić, T Perković, M Čagalj - 2019 4th International …, 2019 - ieeexplore.ieee.org
WiFi connection protocol is Active service discovery (AS). Using AS, WiFi enabled devices
send out Probe request … SSID from users previously used WiFi access points. By using a …

Efficient association of wi-fi probe requests under mac address randomization

J Tan, SHG Chan - IEEE INFOCOM 2021-IEEE Conference on …, 2021 - ieeexplore.ieee.org
… only three devices. In this paper, we study how to associate probe requests which have …
To illustrate this, we record the probe requests emitted from an iOS device for 24 hours. The …