CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10) Retrieved 10 ,
11 a/g/p OFDM receiver for GNU radio, SRIF Workshop, 2013. ,
The scrambler attack: A robust physical layer attack on location privacy in vehicular networks, 2015 International Conference on Computing, Networking and Communications (ICNC), 2015. ,
DOI : 10.1109/ICCNC.2015.7069376
Wireless device identification with radiometric signatures, Proceedings of the 14th ACM international conference on Mobile computing and networking, MobiCom '08, 2008. ,
DOI : 10.1145/1409944.1409959
Wi-Fi internet connectivity and privacy: hiding your tracks on the wireless internet, IEEE CSCN, 2015. ,
Retrieved from https ,
Fingerprinting Smartphones Remotely via ICMP Timestamps, IEEE Communications Letters, vol.17, issue.6, pp.1081-1083, 2013. ,
DOI : 10.1109/LCOMM.2013.040913.130419
Attacking automatic wireless network selection, Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005., 2005. ,
DOI : 10.1109/IAW.2005.1495975
On physical-layer identification of wireless devices, ACM Computing Surveys, vol.45, issue.1, p.6, 2012. ,
DOI : 10.1145/2379776.2379782
Snoopy: Distributed tracking and profiling framework, 2012. ,
Analysing the privacy policies of Wi-Fi trackers, Proceedings of the 2014 workshop on physical analytics, WPA '14, 2014. ,
DOI : 10.1145/2611264.2611266
URL : https://hal.archives-ouvertes.fr/hal-00983363
Identifying unique devices through wireless fingerprinting, Proceedings of the first ACM conference on Wireless network security , WiSec '08, 2008. ,
DOI : 10.1145/1352533.1352542
How unique is your web browser? In Privacy Enhancing Technologies, 2010. ,
Passive data link layer 802.11 wireless device driver fingerprinting, USENIX Security, 2006. ,
How talkative is your mobile device? An experimental study of Wi-Fi probe requests, WiSec, 2015. ,
NSA tracking cellphone locations worldwide, Snowden documents show ,
Channel Bounding and MAC Protection Mechanisms for 802.11ac, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011, 2011. ,
DOI : 10.1109/GLOCOM.2011.6133869
A method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac). RFC 7217, 2014. ,
No, this isn't a scene from minority report. This trash can is stalking you, Ars Technica, 2013. ,
Can Ferris Bueller still have his day off? protecting privacy in the wireless era, USENIX HotOS, 2007. ,
iwlwifi: mvm: support random MAC address for scanning, Linux commit effd05ac479b ,
Enhancing location privacy in wireless LAN through disposable interface identifiers, Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots , WMASH '03, pp.315-325, 2005. ,
DOI : 10.1145/941326.941334
Sequence Number-Based MAC Address Spoof Detection, RAID, 2006. ,
DOI : 10.1007/11663812_16
Experience with MAC address randomization in Windows 10, 93th Internet Engineering Task Force Meeting (IETF), 2015. ,
Tracking Games in Mobile Networks, Conf. on Decision and Game Theory for Security, 2010. ,
DOI : 10.1007/978-3-642-17197-0_3
Mobile location tracking in metro areas, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010. ,
DOI : 10.1145/1866307.1866318
On fast and accurate detection of unauthorized wireless access points using clock skews, Proceedings of the 14th ACM international conference on Mobile computing and networking, MobiCom '08, 2008. ,
DOI : 10.1145/1409944.1409958
A universally unique identifier (UUID) URN namespace, RFC, vol.4122, 2005. ,
DOI : 10.17487/rfc4122
Privacy-preserving 802.11 access-point discovery, Proceedings of the second ACM conference on Wireless network security, WiSec '09, 2009. ,
DOI : 10.1145/1514274.1514293
iOS 8 MAC randomization ? analyzed! http://blog.airtightnetworks.com/ios8-mac- randomization-analyzed ,
Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, 2012. ,
DOI : 10.1145/2426656.2426685
CreepyDOL: Cheap, distributed stalking, BlackHat, 2013. ,
11 user fingerprinting, MobiCom, 2007. ,
Tryst: The case for confidential service discovery, HotNets, 2007. ,
The NSA's secret role in the U.S. assassination program. The Intercept, 2014. ,
Privacy and your app, Apple Worldwide Dev. Conf. (WWDC), 2015. ,
Who do you sync you are?, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, WiSec '13, 2013. ,
DOI : 10.1145/2462096.2462099
An Overview of Peak-to-Average Power Ratio Reduction Techniques for OFDM Systems, 2006 IEEE International Symposium on Signal Processing and Information Technology, 2006. ,
DOI : 10.1109/ISSPIT.2006.270915
Wireless networking in Windows 10, Windows Hardware Engineering Community conference (WinHEC), 2015. ,
Wi-Fi Simple Configuration Protocol and Usability Best Practices for the Wi-Fi Protected Setup Program, 2011. ,