A Study of MAC Address Randomization in Mobile Devices and When it Fails
暂无分享,去创建一个
Erik C. Rye | Jeremy Martin | Travis Mayberry | Collin Donahue | Lucas Foppe | Lamont Brown | Chadwick Riggins | Dane Brown | Travis Mayberry | Jeremy Martin | Collin Donahue | Lucas Foppe | Lamont Brown | Chadwick Riggins | Dane Brown
[1] Johnny Cache,et al. Hacking Exposed Wireless: Wireless Security Secrets & Solutions , 2007 .
[2] Ashok K. Agrawala,et al. WiFi Localization Based on IEEE 802.11 RTS/CTS Mechanism , 2015, EAI Endorsed Trans. Cogn. Commun..
[3] Avery Pennarun,et al. Passive Taxonomy of Wifi Clients using MLME Frame Contents , 2016, ArXiv.
[4] Jonathan Bard. Unpacking the Dirtbox: Confronting Cell Phone Location Tracking with the Fourth Amendment , 2016 .
[5] Matthew S. Gast,et al. 802.11 Wireless Networks: The Definitive Guide , 2002 .
[6] Damon McCoy,et al. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting , 2006, USENIX Security Symposium.
[7] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[8] P. Steerenberg,et al. Targeting pathophysiological rhythms: prednisone chronotherapy shows sustained efficacy in rheumatoid arthritis. , 2010, Annals of the rheumatic diseases.
[9] Christian Hoene,et al. Four-way TOA and software-based trilateration of IEEE 802.11 devices , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[10] Alessandro Epasto,et al. CRAWDAD dataset sapienza/probe-requests (v.2013-09-10) , 2013 .
[11] Brian L. Owsley. Spies in the Skies: Dirtboxes and Airplane Electronic Surveillance , 2015 .
[12] Tariq Rahim Soomro,et al. Impact of Smartphone's on Society , 2013 .
[13] A. B. M. Musa,et al. Tracking unmodified smartphones using wi-fi monitors , 2012, SenSys '12.
[14] Erik C. Rye,et al. Decomposition of MAC address structure for granular device inference , 2016, ACSAC.
[15] Mathieu Cunche,et al. I know your MAC address: targeted tracking of individual using Wi-Fi , 2014, Journal of Computer Virology and Hacking Techniques.
[16] Eric Mayer,et al. 80211 Wireless Networks The Definitive Guide , 2016 .
[17] Roksana Boreli,et al. Linking wireless devices using information contained in Wi-Fi probe requests , 2014, Pervasive Mob. Comput..
[18] Donald E. Eastlake,et al. IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters , 2013, RFC.
[19] Mathieu Cunche,et al. Defeating MAC Address Randomization Through Timing Attacks , 2016, WISEC.
[20] Frank Piessens,et al. Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms , 2016, AsiaCCS.