Research

Publications

Conference papers, posters, and research outputs sourced from the existing repository content.

Spying through your voice assistants: Realistic voice command fingerprinting

Spying through your voice assistants: Realistic voice command fingerprinting

We show that multiple voice assistant platforms can be fingerprinting equally effectively. We also show that the fingerprinting process can be performed remotely mixed with traffic from other devices. Adding additional features such as flow and burst based features can also increase fingerprinting performance

Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices

Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices

We show that not only is it possible to effectively fingerprint 188 IoT devices (with over 97% accuracy), but also to do so even with multiple instances of the same make-and-model device. We also analyze the extent to which temporal, spatial and data-collection- methodology differences impact fingerprinting accuracy. Our analysis sheds light on features that are more ro- bust against varying conditions

Understanding the Privacy Implications of Adblock Plus’s Acceptable Ads

In this paper we collect historical updates made to Adblock Plus’s exception list and real-world web traffic by visiting the top 10k websites listed by Tranco. Using such data we analyze not only how the exception list has evolved over the years in terms of both contents unblocked and partners/entities enrolled into the Acceptable Ads initiative, but also the privacy implications of enabling the exception list by default

Poster: Fingerprinting IoT Devices in Open-world Setting

In this poster, we try to understand how effectively an attacker can fingerprint unseen targeted IoT devices when building a classifier using either devices manufactured by the same company or devices with similar functionality