Summary: | 碩士 === 國立臺灣科技大學 === 資訊工程系 === 95 === One of the important security issues on network transaction is to develop trustworthy technologies for remote device identification. T. Kohno et al. proposed a method to generate remote physical device fingerprint recently. They observed that the hardware clock skew of every physical device is different from others, and the amount of clock skew, which can be measured over many different network configurations by their approach, is suitable to uniquely identify any remote physical device. However, it’s possible that two devices have very close clock skews such that they are measured as the same device over limited degree of precision. To avoid this kind of misjudgments, this thesis develops another clock skew independent approach. Previous papers from D. L. Mills reported that there exists some characteristic on the way time offset changes during continuous time synchronization with NTP, the network time protocol, and our approach try to utilize these characteristics to distinguish different remote computers. In our experiments, four computers and three NTP servers of different network configurations are used to record the progress of continuous time synchronizations with all possible pairs. By analyzing logs of all pairs with statistics techniques, we have been successful on identifying all servers from every client.
|