Everywhere all at once: Co-location attacks on public cloud FaaS

ZN Zhao, A Morrison, CW Fletcher… - Proceedings of the 29th …, 2024 - dl.acm.org
Microarchitectural side-channel attacks exploit shared hardware resources, posing
significant threats to modern systems. A pivotal step in these attacks is achieving physical …

A classification-based algorithm to detect forged embedded machines in IoT environments

V Selis, A Marshall - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
In the Internet of Things (IoT), interconnected devices manage essential information related
to people's lives; hence, securing this information is essential. The number of these …

Enhanced performance and privacy for TLS over TCP fast open

E Sy, T Mueller, C Burkert, H Federrath… - arxiv preprint arxiv …, 2019 - arxiv.org
Small TCP flows make up the majority of web flows. For them, the TCP three-way handshake
induces significant delay overhead. The TCP Fast Open (TFO) protocol can significantly …

Remote fingerprinting of mobile phones

VK Khanna - IEEE Wireless Communications, 2015 - ieeexplore.ieee.org
Mobile phone users access content from websites using their browsers and are tracked by
cookies. Users also access content using mobile applications, which are tracked by totally …

On reliability of clock-skew-based remote computer identification

L Polčák, B Franková - 2014 11th International Conference on …, 2014 - ieeexplore.ieee.org
Clocks have a small in-built error. As the error is unique, each clock can be identified. This
paper explores remote computer identification based on the estimation of clock skew …

Hough transform-based clock skew measurement over network

KO Saputra, WC Teng, TH Chen - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The accurate clock skew measurement of remote devices over network connections is
crucial to device fingerprinting and other related applications. Current approaches use the …

[HTML][HTML] Host identification based on self-similarity of network activity

L Huang, G Zhao, L Li, F Zhang - Computer Communications, 2022 - Elsevier
The randomness and variability of IP addresses challenge the identity uniqueness of
internet hosts. Accurately identifying internet hosts on the premise of protecting users' …

Counting devices: Revisiting existing approaches in today's settings

F Le, E Valdez, PC Cheng - … Conference on Big Data (Big Data …, 2019 - ieeexplore.ieee.org
The ability to count and fingerprint devices (optionally, from a given type) that are in a
network, and potentially behind a NAT is important not only for network management (eg …

A fake timing attack against behavioural tests used in embedded IoT M2M communications

V Selis, A Marshall - 2017 1st Cyber Security in Networking …, 2017 - ieeexplore.ieee.org
Interconnected embedded machines in the Internet of Things (IoT) play a key role for
collecting and managing data from the real environment. These machines adopt Machine-to …

MEDA: A machine emulation detection algorithm

V Selis, A Marshall - … 12th International Joint Conference on e …, 2015 - ieeexplore.ieee.org
Security in the Internet of Things (IoT) is now considered a priority, and trust in machine-to-
machine (M2M) communications is expected to play a key role. This paper presents a …