Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2020
DOI: 10.1145/3395351.3399421
|View full text |Cite
|
Sign up to set email alerts
|

Peek-a-boo

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
56
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 162 publications
(56 citation statements)
references
References 27 publications
0
56
0
Order By: Relevance
“…Fingerprinting attacks have also been studied, by taking into account several types of IoT devices operating on several different (e.g. Bluetooth Low Energy, WiFi, ZigBee) [117]. Not only is it possible to guess what type of IoT device is used in a given environment, but also the activity of the device (on / off) can be identified.…”
Section: • Level Of Protection 1: Encrypted Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Fingerprinting attacks have also been studied, by taking into account several types of IoT devices operating on several different (e.g. Bluetooth Low Energy, WiFi, ZigBee) [117]. Not only is it possible to guess what type of IoT device is used in a given environment, but also the activity of the device (on / off) can be identified.…”
Section: • Level Of Protection 1: Encrypted Datamentioning
confidence: 99%
“…In [120], the authors have the same objectives as [117] but develop a new attack more resistant to detection methods and countermeasures such as traffic shaping. For this, the authors have created a 'Ping-Pong' tool, which makes it possible to automate the collection of data and to deduce the type of activity of a device.…”
Section: • Level Of Protection 1: Encrypted Datamentioning
confidence: 99%
“…We infer sensitive information from the encrypted communications of wearable devices by using traffic-analysis attacks [44], a technique that exploits the communication patterns (e.g., packet sizes and timings) of encrypted traffic. These attacks have been successfully demonstrated in diverse settings: to recognize web pages on Tor traffic [48,67,88,89], to fingerprint devices [68] or to infer the activities performed in a user's smart home [17,81] and to recognize user activities and applications used on a smartphone (e.g., sending an e-mail or browsing a web page) [42,76,83,84,94]. The focus of recent related works has been on inferring user activities in the IoT and smart home setting [17,21,27,28,85], eavesdropping on WLAN or Internet traffic (or both).…”
Section: New Insulin Injectionmentioning
confidence: 99%
“…Second, they show how the traffic is linked to the gait of the wearer, and that the encrypted traffic is enough to recognize a person with 97.6% accuracy across 10 users. Acar et al infer user actions in a smart home using a layered traffic-analysis attack [17]. Their methodology is similar to ours: they first perform device identification and then use it as a stepping stone to further infer device states and user activities.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation