Comment on "Remote Physical Device Fingerprinting"
In this paper we revisited a method to identify computers by their clocks skew computed from TCP timestamps. We introduced our own tool to compute clock skew of computers in a network. We validated that the original method is suitable for the computer identification but we also discovered that Linux...
Saved in:
Published in | IEEE transactions on dependable and secure computing Vol. 11; no. 5; pp. 494 - 496 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
IEEE
01.09.2014
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In this paper we revisited a method to identify computers by their clocks skew computed from TCP timestamps. We introduced our own tool to compute clock skew of computers in a network. We validated that the original method is suitable for the computer identification but we also discovered that Linux hosts running NTP had become immune to the identification. |
---|---|
ISSN: | 1545-5971 |
DOI: | 10.1109/TDSC.2013.26 |