Readings in Computer Science
Author:
Niyaz
Last Updated:
há 9 anos
License:
Creative Commons CC BY 4.0
Abstract:
(Final version)
Can a Smartphone be specifically identified according to the behavior or actions of the user? Smartphones are nowadays widely used especially due to their numerous functionalities. These devices act like small computers as they have many functions such as internet connection, emailing, chats, social media among others. A lot of traffic is therefore generated from these devices and adversaries may use the traffic to attack the smartphones. Traffic generated by smartphones may be used to interfere with user privacy. Information collected from the traffic can be used to create specific fingerprints that will identify a particular device. This is seen from the two articles reviewed in this paper. Both papers investigate how traffic from a smartphone can be used by attackers to infringe user privacy. Though different methods are used in the studies, the results indicate that user privacy can be infringed.
\begin
Discover why 18 million people worldwide trust Overleaf with their work.