no code implementations • 6 Aug 2014 • Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, Dan Boneh
We demonstrate how the multitude of sensors on a smartphone can be used to construct a reliable hardware fingerprint of the phone.
Cryptography and Security