A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

Behavioral fingerprinting of iot devices

B Bezawada, M Bachani, J Peterson, H Shirazi… - Proceedings of the …, 2018 - dl.acm.org
The Internet-of-Things (IoT) has brought in new challenges in device identification--what the
device is, and authentication--is the device the one it claims to be. Traditionally, the …

Who do you sync you are? smartphone fingerprinting via application behaviour

T Stöber, M Frank, J Schmitt, I Martinovic - Proceedings of the sixth ACM …, 2013 - dl.acm.org
The overall network traffic patterns generated by today's smartphones result from the
typically large and diverse set of installed applications. In addition to the traffic generated by …

Iot device identification via network-flow based fingerprinting and learning

SA Hamad, WE Zhang, QZ Sheng… - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
Nowadays, increasing number of intelligent devices and smart sensors are connected by
Internet of Things (IoT) techniques, and have helped people to manage and improve their …

GTID: A Technique for Physical Device and Device Type Fingerprinting

SV Radhakrishnan, AS Uluagac… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we introduce GTID, a technique that can actively and passively fingerprint
wireless devices and their types using wire-side observations in a local network. GTID …

DEFT: A distributed IoT fingerprinting technique

V Thangavelu, DM Divakaran, R Sairam… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Identifying IoT devices connected to a network has multiple security benefits, such as
deployment of behavior-based anomaly detectors, automated vulnerability patching of …

Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic

T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as
it provides insights into the apps active on a network. Unfortunately, existing techniques …

Drawnapart: A device identification technique based on remote gpu fingerprinting

T Laor, N Mehanna, A Durey, V Dyadyuk… - arXiv preprint arXiv …, 2022 - arxiv.org
Browser fingerprinting aims to identify users or their devices, through scripts that execute in
the users' browser and collect information on software or hardware characteristics. It is used …

[PDF][PDF] Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.

A Das, N Borisov, M Caesar - NDSS, 2016 - ndss-symposium.org
Modern smartphones contain motion sensors, such as accelerometers and gyroscopes.
These sensors have many useful applications; however, they can also be used to uniquely …

IoT device fingerprint using deep learning

S Aneja, N Aneja, MS Islam - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
Device Fingerprinting (DFP) is the identification of a device without using its network or other
assigned identities including IP address, Medium Access Control (MAC) address, or …