Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2939918.2939930acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Defeating MAC Address Randomization Through Timing Attacks

Published: 18 July 2016 Publication History

Abstract

MAC address randomization is a common privacy protection measure deployed in major operating systems today. It is used to prevent user-tracking with probe requests that are transmitted during IEEE 802.11 network scans. We present an attack to defeat MAC address randomization through observation of the timings of the network scans with an off-the-shelf Wi-Fi interface. This attack relies on a signature based on inter-frame arrival times of probe requests, which is used to group together frames coming from the same device although they use distinct MAC addresses. We propose several distance metrics based on timing and use them together with an incremental learning algorithm in order to group frames. We show that these signatures are consistent over time and can be used as a pseudo-identifier to track devices. Our framework is able to correctly group frames using different MAC addresses but belonging to the same device in up to 75% of the cases. These results show that the timing of 802.11 probe frames can be abused to track individual devices and that address randomization alone is not always enough to protect users against tracking.

References

[1]
Android 6.0 changes. Retrieved from https://developer.android.com/about/versions/ marshmallow/android-6.0-changes.html, 2015.
[2]
M. V. Barbera, A. Epasto, A. Mei, S. Kosta, V. C. Perta, and J. Stefa. CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10). Retrieved 10 November, 2015, from, http://crawdad.org/sapienza/ probe-requests/20130910, Sept. 2013.
[3]
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver ngerprinting. In Usenix Security, volume 6, 2006.
[4]
J. Freudiger. How talkative is your mobile device?: an experimental study of Wi-Fi probe requests. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, 2015.
[5]
E. Grumbach. iwlwi: mvm: support random MAC address for scanning. Linux commit effd05ac479b.
[6]
C. Huitema. Experience with mac address randomization in windows 10, 2015.
[7]
B. Misra. ios8 mac randomization -- analyzed! http://blog.mojonetworks.com/ios8-mac- randomization-analyzed/, 2014.
[8]
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user ngerprinting. In MobiCom, pages 99--110. ACM, 2007.
[9]
K. Skinner and J. Novak. Privacy and your app. In Apple Worldwide Dev. Conf. (WWDC), June 2015.
[10]
M. Vanhoef, C. Matte, M. Cunche, L. Cardoso, and F. Piessens. Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms. In AsiaCCS, May 2016.
[11]
B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos. Privacy in inter-vehicular networks: Why simple pseudonym change is not enough. In Wireless On-demand Network Systems and Services (WONS), pages 176--183. IEEE, 2010.

Cited By

View all
  • (2024)Heterogeneous Dual-Attentional Network for WiFi and Video-Fused Multi-Modal Crowd CountingIEEE Transactions on Mobile Computing10.1109/TMC.2024.344446923:12(14233-14247)Online publication date: Dec-2024
  • (2024)On the Fine-Grained Crowd Analysis via Passive WiFi SensingIEEE Transactions on Mobile Computing10.1109/TMC.2023.332433423:6(6697-6711)Online publication date: Jun-2024
  • (2024)Surveilling the Masses with Wi-Fi-Based Positioning Systems2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00239(2831-2846)Online publication date: 19-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
July 2016
242 pages
ISBN:9781450342704
DOI:10.1145/2939918
© 2016 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 July 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 802.11
  2. mac address randomization
  3. privacy
  4. security
  5. tracking

Qualifiers

  • Short-paper

Funding Sources

  • Région Rhône-Alpes

Conference

WiSec'16
Sponsor:

Acceptance Rates

WiSec '16 Paper Acceptance Rate 13 of 51 submissions, 25%;
Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)66
  • Downloads (Last 6 weeks)6
Reflects downloads up to 18 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Heterogeneous Dual-Attentional Network for WiFi and Video-Fused Multi-Modal Crowd CountingIEEE Transactions on Mobile Computing10.1109/TMC.2024.344446923:12(14233-14247)Online publication date: Dec-2024
  • (2024)On the Fine-Grained Crowd Analysis via Passive WiFi SensingIEEE Transactions on Mobile Computing10.1109/TMC.2023.332433423:6(6697-6711)Online publication date: Jun-2024
  • (2024)Surveilling the Masses with Wi-Fi-Based Positioning Systems2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00239(2831-2846)Online publication date: 19-May-2024
  • (2024)Practical Obfuscation of BLE Physical-Layer Fingerprints on Mobile Devices2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00073(2867-2885)Online publication date: 19-May-2024
  • (2024)Privacy-Preserving Crowd Estimation Using Multiple Wi-Fi Sensors2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems (MASS)10.1109/MASS62177.2024.00049(314-320)Online publication date: 23-Sep-2024
  • (2024)A Tutorial on Privacy, RCM and Its Implications in WLANIEEE Communications Surveys & Tutorials10.1109/COMST.2023.334574626:2(1003-1040)Online publication date: Oct-2025
  • (2024)Reduce to the MACs - Privacy Friendly Generic Probe RequestsICT Systems Security and Privacy Protection10.1007/978-3-031-65175-5_3(31-45)Online publication date: 26-Jul-2024
  • (2023)Tools for Ground-Truth-Free Passive Client Density Mapping in MAC-Randomized Outdoor WiFi NetworksSensors10.3390/s2313614223:13(6142)Online publication date: 4-Jul-2023
  • (2023)Automatic Passenger Counting on the Edge via Unsupervised ClusteringSensors10.3390/s2311521023:11(5210)Online publication date: 30-May-2023
  • (2023)Non-Intrusive Privacy-Preserving Approach for Presence Monitoring Based on WiFi Probe RequestsSensors10.3390/s2305258823:5(2588)Online publication date: 26-Feb-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media