SkewMask: Frustrating Clock Skew Fingerprinting Attempts

نویسندگان

  • Ben Ransford
  • Elisha Rosensweig
چکیده

Previous work has shown that clock skew can be considered an identifying feature of a physical system, independent of time of measurement, network location of subject and observer, and other factors. Under certain reasonable assumptions, it is possible to fingerprint, or uniquely identify within some anonymity set, a remote machine by observing some of its network traffic and observing changes in the timestamps it sends in outgoing TCP headers. In this work we present and implement a simple scheme by which a machine can mask, or intentionally misrepresent, its clock skew, as a defense against fingerprinting by remote machines. We demonstrate the manner in which this masking scheme can be used to disguise a single machine or a group of machines, and we explore the limitations of our masking defense.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cloaking the Clock: Emulating Clock Skew in Controller Area Networks

Automobiles are equipped with Electronic Control Units (ECU) that communicate via in-vehicle network protocol standards such as Controller Area Network (CAN). These protocols are designed under the assumption that separating invehicle communications from external networks is sufficient for protection against cyber attacks. This assumption, however, has been shown to be invalid by recent attacks...

متن کامل

Rogue Access Point Detection Using Time Stamp

This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...

متن کامل

WLAN Intrusion Detection System

This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...

متن کامل

Minimizing the E ect of Clock Skew Via Circuit

Clock skew is often cited as an impediment to designing high-performance synchronous circuits. Clock skew reduces the performance of a circuit by reducing the time available for computation, and it may even cause circuit failure by allowing race conditions. In this paper, we show how to use retiming to reduce the e ect of clock skew in both edge-clocked and level-clocked circuits. We include bo...

متن کامل

Analysis of Impact of Transistor Aging Effects on Clock Skew in Nano-scale Cmos

2011 Transistor aging effects in Nano-scale CMOS result in transistor performance degradation over the device lifetime. The primary physical mechanism behind transistor aging is Bias Temperature Instability (BTI). Such transistor aging results in circuit performance degradation over time. In this research we are interested in analyzing the impact of the BTI aging effect on clock skew in on-chip...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007