SkewMask: Frustrating Clock Skew Fingerprinting Attempts
نویسندگان
چکیده
Previous work has shown that clock skew can be considered an identifying feature of a physical system, independent of time of measurement, network location of subject and observer, and other factors. Under certain reasonable assumptions, it is possible to fingerprint, or uniquely identify within some anonymity set, a remote machine by observing some of its network traffic and observing changes in the timestamps it sends in outgoing TCP headers. In this work we present and implement a simple scheme by which a machine can mask, or intentionally misrepresent, its clock skew, as a defense against fingerprinting by remote machines. We demonstrate the manner in which this masking scheme can be used to disguise a single machine or a group of machines, and we explore the limitations of our masking defense.
منابع مشابه
Cloaking the Clock: Emulating Clock Skew in Controller Area Networks
Automobiles are equipped with Electronic Control Units (ECU) that communicate via in-vehicle network protocol standards such as Controller Area Network (CAN). These protocols are designed under the assumption that separating invehicle communications from external networks is sufficient for protection against cyber attacks. This assumption, however, has been shown to be invalid by recent attacks...
متن کاملRogue Access Point Detection Using Time Stamp
This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...
متن کاملWLAN Intrusion Detection System
This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...
متن کاملMinimizing the E ect of Clock Skew Via Circuit
Clock skew is often cited as an impediment to designing high-performance synchronous circuits. Clock skew reduces the performance of a circuit by reducing the time available for computation, and it may even cause circuit failure by allowing race conditions. In this paper, we show how to use retiming to reduce the e ect of clock skew in both edge-clocked and level-clocked circuits. We include bo...
متن کاملAnalysis of Impact of Transistor Aging Effects on Clock Skew in Nano-scale Cmos
2011 Transistor aging effects in Nano-scale CMOS result in transistor performance degradation over the device lifetime. The primary physical mechanism behind transistor aging is Bias Temperature Instability (BTI). Such transistor aging results in circuit performance degradation over time. In this research we are interested in analyzing the impact of the BTI aging effect on clock skew in on-chip...
متن کامل