|
[1] J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. In Proceedings of the 15th Usenix Security Symposium, 2006. [2] Cherita Corbett, Raheem Beyah, and John Copeland. "A Passive Approach to Wireless NIC Identification." To appear in the Proceedings of IEEE International Conference on Communications (ICC), June 2006. [3] T. Kohno, A. Broido, and K. C. Claffy, “Remote physical device fingerprinting,” in SP ’05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, May 2005. [4] Exponentially Weighted Moving Average Model http://en.wikipedia.org/wiki/Moving_average [5] S.B. Moon, P. Skelly, and D. Towsley, “Estimation and Removal of Clock Skew From Network Delay Measurements,” Proc. INFOCOM Conf., 1999 [6] V. Paxson, “On Calibrating Measurements of Packet Transit Times,” Proc. SIGMETRICS Conf., 1998 [7] M.E. Dyer, “Linear Time Algorithms for Two- and Three-Variable Linear Programs,” SIAM J. Computing, vol. 13, 1984. [8] N. Megiddo, “Linear-Time Algorithms for Linear Programming in R3 and Related Problems,” SIAM J. Computers, vol. 12, 1983. [9] M. Martinec. Temperature dependency of a quartz oscillator. http://www.ijs.si/time/#temp-dependency. [10] M. G. Kuhn. Personal communication. [11] C-MAC MicroTechnology. HC49/4H SMX crystals datasheet, September 2004. http://www.cmac.com/ mt/databook/crystals/smd/hc49 4h smx.pdf. [12] S. J. Murdoch, “Hot or not: revealing hidden services by their clock skew,” in CCS ’06: Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, pp. 27–36. [13] R. Dingledine, N. Mathewson, and P. F. Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, August 2004. [14] Mbmon, A tty motherboard monitor, http://www.freshports.org/sysutils/mbmon/. [15] Douglas C. Montgomery. Introduction to Statistical Quality Control.John Wiley and Sons, USA, July 2004. [16] K-fold Cross-validation. http://en.wikipedia.org/wiki/Cross-validation [17] Ming Tham. Dealing with measurment noise. http://lorien.ncl.ac.uk/ming/_lter/ _llpass.htm, accessed December 2005. [18] Simple Least-Squares Linear Regression. http://www.tufts.edu/~gdallal/slr.htm [19] Nmap free security scanner, http://www.insecure.org/nmap/, 2004. [20] Project details for p0f, http://freshmeat.net/projects/p0f/, 2004. [21] Xprobe official home, http://www.sys-security.com/index.php?page=xprobe, 2004. [22] F. Veysset, O. Courtay, and O. Heen, “New Tool and Technique for Remote Operating System Fingerprinting,” http://www.intranode.com/fr/doc/ring-short-paper.pdf, 2002.
|