CPG-FS: A CPU Performance Graph Based Device Fingerprint Scheme for Devices Identification and Authentication

Device fingerprint extracting has emerged as a popular but debatable technique to identify users by recognizing their devices. Two main drawbacks significantly affect the accuracy and stability of the whole process: the spoofing and the unstable device hardware or software features. In this paper, we propose a fingerprint framework mainly based on the hardware system ability of the tested devices. We have made an experiment to prove that every computer or device has different CPU graph when running specific programs (challenges) from other computers. The experiment results show that using the CPU graphs with our proposed comparison mechanism can achieve the high uniqueness and stability of the extracted fingerprint comparing with other fingerprint techniques. We also design a prototype model based on the device fingerprint and biological features to fix the drift problem.

[1]  Balachander Krishnamurthy,et al.  Privacy leakage vs . Protection measures : the growing disconnect , 2011 .

[2]  Frank Piessens,et al.  FPDetective: dusting the web for fingerprinters , 2013, CCS.

[3]  Laurence T. Yang,et al.  Cyberentity Security in the Internet of Things , 2013, Computer.

[4]  Song Li,et al.  (Cross-)Browser Fingerprinting via OS and Hardware Level Features , 2017, NDSS.

[5]  Arvind Narayanan,et al.  The Web Never Forgets: Persistent Tracking Mechanisms in the Wild , 2014, CCS.

[6]  Gabi Nakibly,et al.  Mobile Device Identification via Sensor Fingerprinting , 2014, ArXiv.

[7]  Gabi Nakibly,et al.  Hardware Fingerprinting Using HTML5 , 2015, ArXiv.

[8]  Wouter Joosen,et al.  PriVaricator: Deceiving Fingerprinters with Little White Lies , 2015, WWW.

[9]  Sándor Imre,et al.  User Tracking on the Web via Cross-Browser Fingerprinting , 2011, NordSec.

[10]  Xiang Cui,et al.  Constructing Browser Fingerprint Tracking Chain Based on LSTM Model , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).

[11]  Yue Xu,et al.  A unified face identification and resolution scheme using cloud computing in Internet of Things , 2018, Future Gener. Comput. Syst..

[12]  Hong Liu,et al.  Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.

[13]  Walter Rudametkin,et al.  Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[14]  Mohammad Zulkernine,et al.  FPGuard: Detection and Prevention of Browser Fingerprinting , 2015, DBSec.

[15]  Peter Eckersley,et al.  How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.

[16]  Romain Rouvoy,et al.  FP-STALKER: Tracking Browser Fingerprint Evolutions , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[17]  Tadayoshi Kohno,et al.  Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 , 2016, USENIX Security Symposium.