2017
DOI: 10.12783/dtcse/cst2017/12531
|View full text |Cite
|
Sign up to set email alerts
|

Zero-Permission Mobile Device Identification Based on the Similarity of Browser Fingerprints

Abstract: Abstract. Mobile device identification techniques can be applied to security authentication, access control and other fields. It is used to uniquely indentify a mobile device through explicit identifiers, e.g., UUID, Android ID, or according to the difference of mobile device acceleration sensor. However, these methods collect features data requiring specified conditions or relying on sensitive permissions. To settle these issues, we propose a zero-permission mobile device identification algorithm based on sim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…The implemented matching function checks that the distance between the attribute values of the submitted fingerprint and the stored fingerprint is below a threshold. Similarly to previous studies [13,26,59], we consider a distance measure that depends on the type of the attribute.…”
Section: Implementation Of the Matching Functionmentioning
confidence: 99%
“…The implemented matching function checks that the distance between the attribute values of the submitted fingerprint and the stored fingerprint is below a threshold. Similarly to previous studies [13,26,59], we consider a distance measure that depends on the type of the attribute.…”
Section: Implementation Of the Matching Functionmentioning
confidence: 99%