Skip to main content

Showing 1–4 of 4 results for author: Heen, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:1504.06093  [pdf, other

    cs.NI cs.CY

    Taming the Android AppStore: Lightweight Characterization of Android Applications

    Authors: Luigi Vigneri, Jaideep Chandrashekar, Ioannis Pefkianakis, Olivier Heen

    Abstract: There are over 1.2 million applications on the Google Play store today with a large number of competing applications for any given use or function. This creates challenges for users in selecting the right application. Moreover, some of the applications being of dubious origin, there are no mechanisms for users to understand who the applications are talking to, and to what extent. In our work, we f… ▽ More

    Submitted 27 April, 2015; v1 submitted 23 April, 2015; originally announced April 2015.

    Comments: 20 pages, single column

    Report number: RR-15-305

  2. arXiv:1404.6457  [pdf, other

    cs.CR cs.NI

    An empirical study of passive 802.11 Device Fingerprinting

    Authors: Christoph Neumann, Olivier Heen, Stéphane Onno

    Abstract: 802.11 device fingerprinting is the action of characterizing a target device through its wireless traffic. This results in a signature that may be used for identification, network monitoring or intrusion detection. The fingerprinting method can be active by sending traffic to the target device, or passive by just observing the traffic sent by the target device. Many passive fingerprinting methods… ▽ More

    Submitted 25 April, 2014; originally announced April 2014.

    Comments: Proceedings of 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW 2012), Workshop on Network Forensics, Security and Privacy (NFSP'12)

  3. arXiv:1307.5756  [pdf, other

    cs.NI cs.CR

    DNStamp: Short-lived Trusted Timestam**

    Authors: Christoph Neumann, Olivier Heen, Stéphane Onno

    Abstract: Trusted timestam** consists in proving that certain data existed at a particular point in time. Existing timestam** methods require either a centralized and dedicated trusted service or the collaboration of other participants using the timestam** service. We propose a novel trusted timestam** scheme, called DNStamp, that does not require a dedicated service nor collaboration between partic… ▽ More

    Submitted 11 March, 2014; v1 submitted 22 July, 2013; originally announced July 2013.

    Comments: The extended version of this work is to appear in Elsevier Computer Networks 64 (2014) pp. 208-224

  4. Pretty Private Group Management

    Authors: Olivier Heen, Erwan Le Merrer, Christoph Neumann, Stéphane Onno

    Abstract: Group management is a fundamental building block of today's Internet applications. Mailing lists, chat systems, collaborative document edition but also online social networks such as Facebook and Twitter use group management systems. In many cases, group security is required in the sense that access to data is restricted to group members only. Some applications also require privacy by kee** grou… ▽ More

    Submitted 22 November, 2011; originally announced November 2011.

    Journal ref: Symposium on Reliable Distributed Systems (2012) 191-200