Readings in Computer Science
Forfatter:
Niyaz
Sidst opdateret:
9 år siden
Licens:
Creative Commons CC BY 4.0
Resumé:
(Final version)
Can a Smartphone be specifically identified according to the behavior or actions of the user? Smartphones are nowadays widely used especially due to their numerous functionalities. These devices act like small computers as they have many functions such as internet connection, emailing, chats, social media among others. A lot of traffic is therefore generated from these devices and adversaries may use the traffic to attack the smartphones. Traffic generated by smartphones may be used to interfere with user privacy. Information collected from the traffic can be used to create specific fingerprints that will identify a particular device. This is seen from the two articles reviewed in this paper. Both papers investigate how traffic from a smartphone can be used by attackers to infringe user privacy. Though different methods are used in the studies, the results indicate that user privacy can be infringed.
\begin
Opdag hvorfor 18 millioner mennesker verden rundt stoler på Overleaf med deres arbejde.