Search
Results
-
Evaluating User Privacy in Bitcoin
(2012)Cryptology ePrint ArchiveBitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, we investigate the privacy guarantees of Bitcoin in the setting where Bitcoin is used as a primary currency for the daily transactions of individuals. More specifically, ...Report -
-
For Some Eyes Only
(2012)Technical report / Systems Group, Department of Computer Science, ETH ZurichReport -
-
Physical-layer identification of wireless sensor nodes
(2012)Technical Report / ETH Zurich, Department of Computer ScienceIdentification of wireless sensor nodes based on the physical characteristics of their radio transmissions can potentially provide additional layer of security in all-wireless multi-hop sensor networks. Reliable identification can be means for detection and/or prevention of wormhole, Sybil and replication attacks, and for complementing cryptographic message authentication protocols. In this paper, we propose an improved method for capturing ...Report -
iPhone and iPod Location Spoofing
(2012)Technical Report / ETH Zurich, Department of Computer ScienceIn this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system [41], available on PCs and used on a number of mobile platforms, including Apple’s iPod touch and iPhone [1]. We demonstrate that this system is vulnerable to location spoofing and location database manipulation attacks. We further discuss approaches for securing Skyhook and similar WLAN-based positioning ...Report -
UWB-based secure ranging and localization
(2012)Technical Report / ETH Zurich, Department of Computer ScienceReport -
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
(2012)Technical Report / ETH Zurich, Department of Computer ScienceWe present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium used and the distance traveled. All ...Report