Lanze, Fabian ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Panchenko, Andriy ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Braatz, Benjamin ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Engel, Thomas ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Language :
English
Title :
Letting the Puss in Boots Sweat: Detecting Fake Access Points using Dependency of Clock Skews on Temperature
Publication date :
2014
Event name :
9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
Event place :
Kyoto, Japan
Event date :
from 04-06-2014 to 06-06-2014
Main work title :
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
Peer reviewed :
Peer reviewed
European Projects :
FP7 - 288535 - CONFINE - Community Networks Testbed for the Future Internet
C. Arackaparambil, S. Bratus, A. Shubina, and D. Kotz. On the reliability of wireless fingerprinting using clock skews. In 3rd ACM Conference on Wireless Network Security (WiSec '10), pages 169-174. ACM, 2010. http://dx.doi.org/10.1145/1741866.1741894.
P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and B. Zill. Enhancing the security of corporate wi-fi networks using DAIR. In 4th International Conference on Mobile Systems, Applications and Services (MobiSys '06), pages 1-14. ACM, 2006. http://dx.doi.org/10.1145/1134680.1134682.
S. Bratus, C. Cornelius, D. Kotz, and D. Peebles. Active behavioral fingerprinting of wireless devices. In 1st ACM Conference on Wireless Network Security (WiSec '08), pages 56-61. ACM, 2008. http://dx.doi.org/10.1145/1352533.1352543.
V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In 14th ACM International Conference on Mobile Computing and Networking (MobiCom '08), pages 116-127. ACM, 2008. http://dx.doi.org/10.1145/1409944.1409959.
N. Cristianini and J. Shawe-Taylor. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods. Cambridge University Press, 2000. http://www.support-vector.net/.
R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In SIGCHI Conference on Human Factors in Computing Systems (CHI '06), pages 581-590. ACM, 2006. http://dx.doi.org/10.1145/1124772.1124861.
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Van Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. In 15th USENIX Security Symposium (SSYM '06), pages 167-178. USENIX Association, 2006. https://www.usenix.org/legacy/events/sec06/tech/full-papers/franklin/franklin.pdf.
K. Gao, C. Corbett, and R. Beyah. A passive approach to wireless device fingerprinting. In 2010 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '10), pages 383-392. IEEE Computer Society, 2010. http://dx.doi.org/10.1109/DSN.2010.5544294.
H. Gonzales, K. Bauer, J. Lindqvist, D. McCoy, and D. Sicker. Practical Defenses for Evil Twin Attacks in 802.11. In IEEE Globecom Communications and Information Security Symposium (Globecom 2010), Miami, FL, December 2010.
J. Hall, M. Barbeau, and E. Kranakis. Detection of transient in radio frequency fingerprinting using signal phase. In 3rd IASTED International Conference on Wireless and Optical Communications (WOC '03), pages 13-18. ACTA Press, 2003. http://people.scs.carleton.ca/~kranakis/Papers/RFFPaper3.pdf.
IEEE Computer Society. Standard 1193-2003: IEEE Guide for Measurement of Environmental Sensitivities of Standard Frequency Generators. http://standards.ieee.org/findstds/standard/1193-2003.html.
IEEE Computer Society. Standard 802.11-2012: IEEE Standard for Information technology-Telecommunications and information exchange between systems, Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. http://standards.ieee.org/findstds/standard/802.11-2012.html.
IETF. RFC 1323: TCP Extensions for High Performance, May 1992. http://www.rfc-editor.org/rfc/rfc1323.txt.
IETF. RFC 2865: Remote Authentication Dial In User Service (RADIUS), June 2000. http://www.rfc-editor.org/rfc/rfc2865.txt.
S. Jana and S. K. Kasera. On fast and accurate detection of unauthorized wireless access points using clock skews. In 14th ACM International Conference on Mobile Computing and Networking (MobiCom '08), pages 104-115. ACM, 2008. http://dx.doi.org/10.1145/1409944.1409958.
T. Kohno, A. Broido, and K. Claffy. Remote physical device fingerprinting. IEEE Transactions on Dependable and Secure Computing, 2(2):93-108, 2005. http://dx.doi.org/10.1109/TDSC.2005.26.
F. Lanze, A. Panchenko, B. Braatz, and A. Zinnen. Clock skew based remote device fingerprinting demystified. In 2012 IEEE Global Telecommunications Conference (GLOBECOM '12), pages 813-819. IEEE Computer Society, 2012. http://dx.doi.org/10.1109/GLOCOM.2012.6503213.
C. D. Manning, P. Raghavan, and H. Schütze. Introduction to Information Retrieval. Cambridge University Press, 2008. http://nlp.stanford.edu/IR-book/.
S. B. Moon, P. Skelly, and D. F. Towsley. Estimation and removal of clock skew from network delay measurements. In 18th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99), pages 227-234. IEEE Computer Society, 1999. http://dx.doi.org/10.1109/INFCOM.1999.749287.
C. Neumann, O. Heen, and S. Onno. An empirical study of passive 802.11 device fingerprinting. In 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW '12), Workshop on Network Forensics, Security and Privacy (NFSP), pages 593-602. IEEE Computer Society, 2012. http://dx.doi.org/10.1109/ICDCSW.2012.8.
C. E. Rasmussen and C. K. I. Williams. Gaussian Processes for Machine Learning. MIT Press, 2006. http://www.gaussianprocess.org/gpml/.
V. Roth, W. Polak, E. Rieffel, and T. Turner. Simple and effective defense against evil twin access points. In 1st ACM Conference on Wireless Network Security (WiSec '08), pages 220-235. ACM, 2008. http://dx.doi.org/10.1145/1352533.1352569.
D. Shaw and W. Kinsner. Multifractal modelling of radio transmitter transients for classification. In Communications, Power and Computing (WESCANEX '97), pages 306-312. IEEE Computer Society, 1997. http://dx.doi.org/10.1109/WESCAN.1997.627159.
B. Sieka. Active fingerprinting of 802.11 devices by timing analysis. In 3rd IEEE Consumer Communications and Networking Conference (CCNC '06), pages 15-19. IEEE Computer Society, 2006. http://dx.doi.org/10.1109/CCNC.2006.1592979.
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying wolf: An empirical study of SSL warning effectiveness. In 18th USENIX Security Symposium (SSYM '09), pages 399-416. USENIX Association, 2009. https://www.usenix.org/legacy/event/sec09/tech/full-papers/sunshine.pdf.
M. B. Uddin and C. Castelluccia. Toward clock skew based wireless sensor node services. In 5th Annual ICST Wireless Internet Conference (WICON '10), pages 1-9. IEEE Computer Society, 2010. http://ieeexplore.ieee.org/xpl/articleDetails. jsp?arnumber=5452689.
V. N. Vapnik and A. J. Červonenkis. Theory of Pattern Recognition [in Russian]. Nauka, 1974. (German Translation: Theorie der Zeichenerkennung, Akademie-Verlag, 1979).
J. R. Vig. Introduction to quartz frequency standards. Research and Development Technical Report SLCET-TR-92-1, U. S. Army Electronics and Devices Laboratory, March 1992. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA248503.
Z. Yang, L. Cai, Y. Liu, and J. Pan. Environment-aware clock skew estimation and synchronization for wireless sensor networks. In A. G. Greenberg and K. Sohraby, editors, INFOCOM 2012, pages 1017-1025. IEEE, 2012.
H. Zhou, C. Nicholls, T. Kunz, and H. Schwartz. Frequency accuracy & stability dependencies of crystal oscillators. Technical Report SCE-08-12, Department of Systems and Computer Engineering, Carleton University, Ottawa, Ontario, Canada, November 2008. http://kunz-pc.sce.carleton.ca/thesis/CrystalOscillators.pdf.