, National Security Agency 4, vol.21

C. Matte, F. Mathieu-cunche, M. Rousseau, and . Vanhoef, Defeating MAC address randomization through timing attacks, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), p.1520, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01330476

C. Matte and M. Cunche, Demo: Panoptiphone: How unique is your Wi-Fi device?, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), p.209211, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01330479

M. Vanhoef, C. Matte, M. Cunche, L. Cardoso, and F. Piessens, Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms, AsiaCCS, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01282900

C. Matte, J. P. Achara, and M. Cunche, Device-to-identity linking attack using targeted Wi-Fi geolocation spoong, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), vol.20, 2015.

, Articles in general-public technical journals (see section VIII.4.3) 1. Célestin Matte. Transfert de style : et si Van Gogh peignait Tux ?, vol.202, 2017.

, INSA Lyon, tous droits réservés 2. Célestin Matte and Mathieu Cunche. Traçage Wi-Fi : applications et contre-mesures

G. France, HS, vol.84, 2016.

C. Matte, Fingerprinting de smartphones : votre téléphone est-il traçable ? MISC-Multi-Systems & Internet Security Cookbook, Additional presentations 1. Célestin Matte and Mathieu Cunche, vol.81, 2015.

M. Vanhoef, C. Matte, M. Cunche, L. Cardoso, and F. Piessens, Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms, Atelier sur la Protection de la Vie Privée, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01282900

M. Vanhoef, C. Matte, M. Cunche, L. Cardoso, and F. Piessens, Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms, CITI Lab, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01282900

C. Matte and M. Cunche, Beam me up, Scotty: identifying the individual behind a MAC address using Wi-Fi geolocation spoong, 1er Colloque sur la Conance Numérique en Auvergne, 2014.

C. Matte and M. Cunche, Beam me up, Scotty: identifying the individual behind a MAC address using Wi-Fi geolocation spoong, Atelier sur la Protection de la Vie Privée, 2014.

M. Célestin-matte, V. Cunche, and . Toubiana, Does disabling Wi-Fi prevent my Android phone from sending Wi-Fi frames?, Other publications 1, 2017.

C. Matte, M. Minier, M. Cunche, and F. Rousseau, Poster: Privacy-preserving Wi-Fi tracking systems, In CITI Lab. PhD Day, 2015.

, Software production 1. Wombat, an experimental tracking system (not public yet)

, INSA Lyon, tous droits réservés 1. Among others

, INSA Lyon, tous droits réservés 1

, Bluetooth and Wi-Fi MAC address based crowd data collection and monitoring: benets, challenges and enhancement, INSA Lyon, tous droits réservés Bibliography, vol.36, 2013.

J. Prasad-achara, G. Acs, and C. Castelluccia, On the unicity of smartphone applications, Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, p.2736, 2015.

V. Acuna, A. Kumbhar, E. Vattapparamban, . Rajabli, and . Guvenc, Localization of wi devices using probe requests captured at unmanned aerial vehicles, Wireless Communications and Networking Conference, p.2017

, IEEE, p.16, 2017.

B. Agr, K. Huguenin, U. Hengartner, and J. Hubaux, On the privacy implications of location semantics, Proceedings on Privacy Enhancing Technologies, 2015.

M. Alaggan, M. Mathieu-cunche, and . Minier, Privacy-preserving tincidence for wi-based mobility analytics, 7e Atelier sur la Protection de la Vie Privée (APVP'16), 2016.

J. Wahhab-albazrqaoe, G. Huang, and . Xing, Practical bluetooth trac sning: Systems and privacy implications, Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, p.333345

T. Allmer, A critical contribution to theoretical foundations of privacy studies, Journal of Information, Communication and Ethics in Society, vol.9, issue.2, p.83101, 2011.

A. , , 2017.

A. Un-general, Universal declaration of human rights. UN General Assembly, 1948.

T. Aura, J. Lindqvist, M. Roe, and A. Mohammed, Chattering laptops, International Symposium on Privacy Enhancing Technologies Symposium, p.167186, 2008.
DOI : 10.1007/978-3-540-70630-4_11

M. Backes, S. Bugiel, E. Derr, S. Gerling, and C. Hammer, R-droid: Leveraging android app analysis with static slice optimization, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, p.129140, 2016.

P. Bahl and . Venkata-n-padmanabhan, Radar: An in-building rf-based user location and tracking system, INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol.2, p.775784, 2000.
DOI : 10.1109/infcom.2000.832252

M. Barbeau, E. Hall, and . Kranakis, Detection of rogue devices in bluetooth networks using radio frequency ngerprinting, proceedings of the 3rd IASTED International Conference on Communications and Computer Networks, CCN, p.46, 2006.

M. V. Barbera, A. Epasto, and A. Mei,

J. Perta and . Stefa, CRAWDAD dataset sapienza/probe-requests (v. 2013-0910), 2013.

A. Marco-v-barbera, A. Epasto, . Mei, C. Vasile, J. Perta et al., Signals from the crowd: uncovering social relationships through smartphone probes, Proceedings of the 2013 conference on Internet measurement conference, p.265276, 2013.

B. Berendt, O. Günther, and S. Spiekermann, Privacy in e-commerce: stated preferences vs. actual behavior, Communications of the ACM, vol.48, issue.4, p.101106, 2005.
DOI : 10.1145/1053291.1053295

, INSA Lyon, tous droits réservés [18] Carlos Bernardos, Juan Carlos Zú«iga, and Piers O'Hanlon. Wi-Fi internet connectivity and privacy: hiding your tracks on the wireless internet, IEEE CSCN, 2015.

B. Bloessl, C. Sommer, F. Dressler, and D. Eckho, The scrambler attack: A robust physical layer attack on location privacy in vehicular networks, ICNC, 2015.

S. Bratus, C. Cornelius, D. Kotz, and D. Peebles, Active behavioral ngerprinting of wireless devices, Proceedings of the rst ACM conference on Wireless network security, p.5661, 2008.
DOI : 10.1145/1352533.1352543

URL : http://www.cs.dartmouth.edu/~dfk/papers/bratus-fingerprint.pdf

L. Breiman, J. Friedman, C. J. Stone, and R. Olshen, Classication and regression trees, 1984.

M. Brennan, S. Afroz, and R. Greenstadt, Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity, ACM Transactions on Information and System Security (TISSEC), vol.15, issue.3, p.12, 2012.

V. Brik, S. Banerjee, M. Gruteser, and S. Oh, Wireless device identication with radiometric signatures, 2008.
DOI : 10.1145/1409944.1409959

G. Bugher, Detecting bluetooth surveillance systems, DEFCON, 2014.

J. Cache, Fingerprinting 802.11 implementations via statistical analysis of the duration eld, Uninformed. org, issue.5, 2006.

. , The store of the future: 150+ startups transforming brick-and-mortar retail in one infographic, 2017.

C. Cerrudo, Hacking us trac control systems, DEFCON, 2014.

Y. Cheng, Mean shift, mode seeking, and clustering, vol.17, p.790799, 1995.

Y. Chon, S. Kim, S. Lee, D. Kim, Y. Kim et al., Sensing wi packets in the air: practicality and implications in urban mobility monitoring, Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, p.189200, 2014.

S. Cliord and Q. Hardy, Attention, Shoppers: Store Is Tracking Your Cell, 2013.

, Mesure de fréquentation et analyse du comportement des consommateurs dans les magasins, 2014.

C. Corbett, R. Beyah, and J. Copeland, A passive approach to wireless nic identication, Communications, 2006. ICC'06, vol.5, p.23292334, 2006.

. Cherita-l-corbett, A. Raheem, J. Beyah, and . Copeland, Passive classication of wireless nics during rate switching, EURASIP Journal on Wireless Communications and Networking, issue.1, p.495070, 2007.

. Cherita-l-corbett, A. Raheem, J. Beyah, and . Copeland, Passive classication of wireless nics during active scanning, International Journal of Information Security, vol.7, issue.5, p.335348, 2008.

M. Cristea and B. Groza, Fingerprinting smartphones remotely via icmp timestamps, IEEE Communications Letters, vol.17, issue.6, p.10811083, 2013.

. Mathieu-cunche, I know your MAC address: Targeted tracking of individual using Wi-Fi, Journal of Computer Virology and Hacking Techniques, p.19, 2013.

M. A. Mathieu-cunche, R. Kaafar, and . Boreli, I know who you will meet this evening! linking wireless devices using Wi-Fi probe requests, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, p.19

, IEEE, 2012.

J. C. Mathieu-cunche, M. Zuniga, C. Vanhoef, and . Matte, Privacy issues in 802, vol.11, 2016.

D. Dino, . Zovi, . Shane, and . Macaulay, Attacking automatic wireless network selection, Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC, p.365372, 2005.

B. Danev, D. Zanetti, and S. Capkun, On physical-layer identication of wireless devices, ACM Computing Surveys (CSUR), vol.45, issue.1, p.6, 2012.

D. Dardari, P. Closas, and P. Djuri¢, Indoor tracking: Theory, methods, and technologies, IEEE Transactions on Vehicular Technology, vol.64, issue.4, p.12631278, 2015.

. Insa-lyon, Do you hear what i hear?: Fingerprinting smart devices through embedded acoustic components, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p.441452, 2014.

. Datatilsynet, Tracking in public spaces, 2016.

Y. Montjoye, A. César, M. Hidalgo, V. Verleysen, and . Blondel, Unique in the crowd: The privacy bounds of human mobility, Scientic reports, vol.3, p.1376, 2013.

. Deloitte, Usages mobiles, 2016.

L. Demir, M. Cunche, and C. Lauradoux, Analysing the privacy policies of Wi-Fi trackers, Proc. of the 2014 workshop on physical analytics, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00983363

S. Depatla, A. Muralidharan, and Y. Mosto, Occupancy estimation using only wi power measurements, IEEE Journal on Selected Areas in Communications, vol.33, issue.7, p.13811393, 2015.
DOI : 10.1109/jsac.2015.2430272

C. Loh-chin, C. Desmond, T. C. Chia-yuan, R. Pheng, and . Lee, Identifying unique devices through wireless ngerprinting, Proceedings of the rst ACM conference on Wireless network security, p.4655, 2008.

A. Di-luzio, A. Mei, and J. Stefa, Mind your probes: Deanonymization of large crowds through smartphone wi probe requests, Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on, p.19, 2016.

P. Eckersley, How unique is your web browser?, Privacy Enhancing Technologies, 2010.
DOI : 10.1007/978-3-642-14527-8_1

P. Jonathan and . Ellch, Fingerprinting 802.11 devices, 2006.

K. Emara, W. Woerndl, and J. Schlichter, CAPS: context-aware privacy scheme for vanet safety applications, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, p.21, 2015.

, INSA Lyon, tous droits réservés [53] Tobias Engel. SS7: Locate. track. manipulate. In Chaos Communication Congress, 2014.

M. Ester, H. Kriegel, J. Sander, and X. Xu, A density-based algorithm for discovering clusters in large spatial databases with noise, Kdd, vol.96, p.226231, 1996.

B. Daniel, . Faria, and . David-r-cheriton, Detecting identity-based attacks in wireless networks using signalprints, Proceedings of the 5th ACM workshop on Wireless security, p.4352, 2006.

Z. Fasel and E. Jacobs, I ght for the users, episode i-attacks against top consumer products, DEFCON, 2016.

K. Fawaz, K. Kim, . Kang, and . Shin, Privacy vs. reward in indoor location-based services, Proceedings on Privacy Enhancing Technologies, vol.2016, p.102122, 2016.

, Federal Trade Commission, 2015.

D. Förster, F. Kargl, and H. Löhr, A framework for evaluating pseudonym strategies in vehicular ad-hoc networks, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, p.19, 2015.

M. Foucault, Surveiller et punir. Naissance de la prison, Editions Gallimard, 2014.

F. Atec, Evaluations simultanées de diérentes technologies innovantes de recueil de données trac pour le calcul de temps de parcours en temps réel, 2015.

J. Franklin, D. Mccoy, P. Tabriz, V. Neagoe, J. V. Randwyk et al., Passive data link layer 802.11 wireless device driver ngerprinting, 2006.

J. Freudiger, How talkative is your mobile device? An experimental study of Wi-Fi probe requests, 2015.
DOI : 10.1145/2766498.2766517

J. Freudiger, M. Raya, M. Félegyházi, P. Papadimitratos, and J. Hubaux, Mix-zones for location privacy in vehicular networks, ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiNITS), 2007.

C. Fuchs, Towards an alternative concept of privacy, Journal of Information, Communication and Ethics in Society, vol.9, issue.4, p.220237, 2011.
DOI : 10.1108/14779961111191039

Y. Fukuzaki, M. Mochizuki, K. Murao, and N. Nishio, A pedestrian ow analysis system using Wi-Fi packet sensors to a real environment
DOI : 10.1145/2638728.2641312

, Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, p.721730, 2014.

B. Fung, Wi-Fi tracking in retail stores, 2013.

, Future of Privacy Forum. Opt out of smart store tracking, 2014.

S. Gallagher, Hands-on: Blue hydra can expose the all-too-unhidden world of bluetooth

K. Gao, C. Corbett, and R. Beyah, A passive approach to wireless device ngerprinting, Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on, p.383392, 2010.

B. Gellman and A. Soltani, NSA tracking cellphone locations worldwide, Snowden documents show. The Washington Post, 2013.

D. Gentry and A. Pennarun, Passive taxonomy of wi clients using mlme frame contents, 2016.

R. Genuer, J. Poggi, and C. Tuleau-malot, Variable selection using random forests, Pattern Recognition Letters, vol.31, issue.14, p.22252236, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00755489

M. Geuss, Creepy but legal phone-tracking company gets wrist slap for empty privacy promise

F. Gont, A method for generating semantically opaque interface identiers with ipv6 stateless address autoconguration (slaac), IETF, vol.7217, 2014.

P. Kn-gopinath, K. Bhagwat, and . Gopinath, An empirical analysis of heterogeneity in ieee 802.11 MAC protocol implementations and its implications, Proceedings of the 1st international workshop on wireless network testbeds, vol.76, p.8087, 2006.

B. Greenstein, R. Gummadi, J. Pang, Y. Mike, T. Chen et al., Can ferris bueller still have his day o ? protecting privacy in the wireless era, HotOS, 2007.

B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan et al., Improving wireless privacy with an identier-free link layer protocol, Proceedings of the 6th international conference on Mobile systems, applications, and services, p.4053, 2008.

G. Grolleau, La captation bluetooth au service des aménagements urbains, 2015.

E. Grumbach, iwlwi: mvm: support random MAC address for scanning. Linux commit effd05ac479b, 2014.

M. Gruteser and D. Grunwald, Enhancing location privacy in wireless LAN through disposable interface identiers: A quantitative analysis, Mobile Networks and Applications, vol.10, issue.3, p.315325, 2005.

F. Guo and T. Chiueh, Sequence number-based MAC address spoof detection, Recent Advances in Intrusion Detection, p.309329, 2006.

J. Hall, M. Barbeau, and E. Kranakis, Enhancing intrusion detection in wireless networks using radio frequency ngerprinting, Communications, Internet, and Information Technology, p.201206, 2004.

D. Halperin, W. Hu, A. Sheth, and D. Wetherall, Tool release: Gathering 802.11 n traces with channel state information, ACM SIGCOMM Computer Communication Review, vol.41, issue.1, p.5353, 2011.

Q. Hardy, Technology turns to tracking people oine

P. Higgins and L. Tien, Mobile tracking code of conduct falls short of protecting consumers, 2013.

, Every step you fakea comparative analysis of tness tracker privacy and security, INSA Lyon, tous droits réservés [87] Andrew Hilts, Christopher Parsons, and Jerey Knockel, 2016.

K. Tin and . Ho, Random decision forests, Proceedings of the Third International Conference on, vol.1, pp.278-282, 1995.

G. Hogben, Changes to device identiers in android o

B. Hoh and M. Gruteser, Protecting location privacy through path confusion, Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on, p.194205, 2005.

R. Holeman, The bluetooth device database, DEFCON, 2013.

B. Huang and E. Snowden, Against the law: Countering lawful abuses of digital surveillance, 2016.

J. Huang, W. Albazrqaoe, and G. Xing, Blueid: A practical system for bluetooth device identication, INFOCOM, 2014 Proceedings IEEE, 2014.

L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, Enhancing wireless location privacy using silent period, Wireless Communications and Networking Conference, vol.2, p.11871192, 2005.

C. Huitema, Experience with MAC address randomization in Windows 10, 93th Internet Engineering Task Force Meeting (IETF), 2015.

, Guidelines for use organizationally unique identier (oui) and company id (cid), IEEE, 2014.

, 11 Working Group and others. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specications, IEEE Std, vol.802, pp.11-2012, 2012.

. Insee, Tableaux de l'économie française, 2017.

. Ictfactsfigures2015, , 2015.

T. Issoufaly and P. U. Tournoux, Bleb: Bluetooth low energy botnet for large scale individual tracking, Next Generation Computing Applications (NextComp), 2017 1st International Conference on, p.115120, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01816475

R. Van-jacobson, D. Braden, and . Borman, Tcp extensions for high performance, RFC 1323, IETF, 1992.

S. Jain, M. Javed, and V. Paxson, Towards mining latent client identiers from network trac, Proceedings on Privacy Enhancing Technologies, vol.2016, pp.100-114, 2016.

S. Jamil, S. Khan, A. Basalamah, and A. Lbath, Classifying smartphone screen on/o state based on wi probe patterns, Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, p.301304, 2016.

S. Jana, . Sneha-kumar, and . Kasera, On fast and accurate detection of unauthorized wireless access points using clock skews, 2008.

T. Jiang, J. Helen, Y. Wang, and . Hu, Preserving location privacy in wireless lans, Proceedings of the 5th international conference on Mobile systems, applications and services, p.246257, 2007.

R. Victor and J. , Most secret war. Penguin UK, 2009.

M. Kamp, C. Kopp, M. Mock, M. Boley, and M. ,

, Privacy-preserving mobility monitoring using sketches of stationary sensor readings, Joint European Conference on Machine Learning and Knowledge Discovery in Databases, p.370386, 2013.

D. Kaplan and . David-m-stanhope, Waveform collection for use in wireless telephone identication, US Patent, vol.5, p.806, 1999.

L. George-kersta, Voiceprint identication, Nature, vol.196, issue.4861, p.12531257, 1962.

Y. Kim, Y. Tian, P. Le-t-nguyen, and . Tague, LAPWiN: Locationaided probing for protecting user privacy in Wi-Fi networks, Communications and Network Security (CNS), 2014 IEEE Conference on, p.427435, 2014.

T. Kohno, A. Broido, and K. Clay, Remote physical device ngerprinting. Dependable and Secure Computing, IEEE Transactions on, vol.2, issue.2, pp.93-108, 2005.

. Valentin-fedorovich-kolchin, Boris Aleksandrovich Sevastyanov

C. Vladimir-pavlovich, , 1978.

E. Constantine, N. Kontokosta, and . Johnson, Urban phenology: Toward a real-time census of the city using Wi-Fi data, Computers, Environment and Urban Systems, vol.64, p.144153, 2017.

K. Henning-siitonen, , 2009.

. Sotiris-b-kotsiantis, P. Zaharakis, and . Pintelas, Supervised machine learning: A review of classication techniques, 2007.

B. Kowitz and L. Cranor, Peripheral privacy notications for wireless networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society, p.9096, 2005.

. Krowdthink, They know where you are-an investigation into the contracts, policies and practices of mobile and Wi-Fi service providers in relation to location tracking, 2016.

A. Kumar, Security and Privacy of Hash-Based Software Applications, 2016.
URL : https://hal.archives-ouvertes.fr/tel-01385488

V. Labatut and H. Cheri, Evaluation of performance measures for classiers comparison, 2011.

M. Langheinrich, Privacy by designprinciples of privacy-aware ubiquitous systems, International conference on Ubiquitous Computing, p.273291

. Springer, , 2001.

P. Leach, M. Mealling, and R. Salz, A universally unique identier (UUID) URN namespace. RFC 4122, IETF, 2005.

Y. Li and T. Zhu, Gait-based Wi-Fi signatures for privacy-preserving, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, p.571582, 2016.

J. Liao and J. Li, Eectively changing pseudonyms for privacy protection in vanets, Pervasive Systems, Algorithms, and Networks, 2009.
DOI : 10.1109/i-span.2009.103

R. Lim, M. Zimmerling, and L. Thiele, Passive, privacy-preserving real-time counting of unmodied smartphones via zigbee interference, Distributed Computing in Sensor Systems (DCOSS), 2015 International Conference on, p.115126, 2015.

J. Lindqvist, T. Aura, G. Danezis, T. Koponen, A. Myllyniemi et al., Privacy-preserving 802.11 access-point discovery, 2009.

L. Lu, R. Wang, J. Ding, W. Mao, W. Chen et al., Fastid: An undeceived router for real-time identication of wi terminals, IFIP Networking Conference (IFIP Networking), p.19, 2015.

A. Luber, M. Junghans, S. Bauer, and J. Schulz, On measuring trac with Wi-Fi and Bluetooth, 18th ITS World Congress, 2011.

J. Macqueen, Some methods for classication and analysis of multivariate observations, Proceedings of the fth Berkeley symposium on mathematical statistics and probability, vol.1, p.281297, 1967.

J. Martin, T. Mayberry, C. Donahue, L. Foppe, L. Brown et al., A study of MAC address randomization in mobile devices and when it fails, 2017.

J. Martin, D. Rhame, R. Beverly, and J. Mceachen, Correlating gsm and 802.11 hardware identiers, Military Communications Conference, MILCOM 2013-2013 IEEE, p.13981403, 2013.
DOI : 10.1109/milcom.2013.237

URL : https://calhoun.nps.edu/bitstream/10945/41596/1/Beverly_Correlating_GSM.pdf

J. Martin, E. Rye, and R. Beverly, Decomposition of MAC address structure for granular device inference, Proceedings of the 32nd Annual Conference on Computer Security Applications, p.7888, 2016.
DOI : 10.1145/2991079.2991098

URL : http://dl.acm.org/ft_gateway.cfm?id=2991098&type=pdf

J. Martinez, Franken still unsatised with Euclid's privacy practices

, unsatisfied-with-euclids-privacy-practices, vol.17, 2013.

C. Matte, Fingerprinting de smartphones : votre téléphone est-il traçable ? MISC-Multi-Systems & Internet Security Cookbook, p.81, 2015.

C. Matte, Transfert de style : et si Van Gogh peignait Tux ? GNU/Linux Magazine France, p.202, 2017.

C. Matte, J. P. Achara, and M. Cunche, Device-to-identity linking attack using targeted Wi-Fi geolocation spoong, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), p.20, 2015.
DOI : 10.1145/2766498.2766521

C. Matte and M. Cunche, Beam me up, Scotty: identifying the individual behind a MAC address using Wi-Fi geolocation spoong, 1er Colloque sur la Conance Numérique en Auvergne, 2014.

C. Matte and M. Cunche, Beam me up, Scotty: identifying the individual behind a MAC address using Wi-Fi geolocation spoong, Atelier sur la Protection de la Vie Privée, 2014.

C. Matte and M. Cunche, Demo: Panoptiphone: How unique is your Wi-Fi device?, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), p.209211, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01330479

C. Matte and M. Cunche, Traçage Wi-Fi : applications et contremesures. GNU/Linux Magazine France, HS, vol.84, 2016.

C. Matte and M. Cunche, Wombat: An experimental Wi-Fi tracking system, Atelier sur la Protection de la Vie Privée, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01679007

C. Matte, F. Mathieu-cunche, M. Rousseau, and . Vanhoef, Defeating MAC address randomization through timing attacks, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), p.1520, 2016.
DOI : 10.1145/2939918.2939930

URL : https://hal.archives-ouvertes.fr/hal-01330476

C. Matte, V. Mathieu-cunche, and . Toubiana, Does disabling Wi-Fi prevent my Android phone from sending Wi-Fi frames?, Research Report RR-9089, 2017.

C. Matte, M. Minier, M. Cunche, and F. Rousseau, Poster: Privacy-preserving Wi-Fi tracking systems, CITI Lab. PhD Day, 2015.

C. Matte and . Panoptiphone, , 2017.

J. Mayer, A. Narayanan, and S. Stamm, Do Not Track: A Universal Third-Party Web Tracking Opt Out, 2011.

W. Melicher, M. Sharif, J. Tan, L. Bauer, M. Christodorescu et al., do not) track me sometimes: Users' contextual preferences for web tracking, Proceedings on Privacy Enhancing Technologies, vol.2016, p.135154, 2016.
DOI : 10.1515/popets-2016-0009

URL : https://doi.org/10.1515/popets-2016-0009

M. Mirza, P. Barford, X. Zhu, S. Banerjee, and M. Blodgett, Fingerprinting 802.11 rate adaption algorithms, INFOCOM, 2011 Proceedings IEEE, p.11611169, 2011.

J. Steven and . Murdoch, Hot or not: Revealing hidden services by their clock skew, Proceedings of the 13th ACM conference on Computer and communications security, p.2736, 2006.

A. Musa and J. Eriksson, Tracking unmodied smartphones using Wi-Fi monitors, Proceedings of the 10th ACM conference on embedded network sensor systems, p.281294, 2012.
DOI : 10.1145/2426656.2426685

URL : http://www.cs.uic.edu/~jakob/papers/musa-sensys12.pdf

C. Neumann, O. Heen, and S. Onno, An empirical study of passive 802.11 device ngerprinting, Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, p.593602, 2012.

, New york city mobile services study: Research brief, 2015.

L. Newman, An open-source toolkit to help patch cell networks' critical aw, p.27, 2017.

L. Nguyen, Y. S. Kim, P. Tague, and J. Zhang, Identitylink: User-device linking through visual and rf-signal cues, ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2014.

. James-o-malley, Here's what t learned from tracking your phone on the tube, p.2017, 2017.

A. Jonathan, A. Obar, and . Oeldorf-hirsch, The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services, The 44th Research Conference on Communication, Information and Internet Policy, 2016.

. Opinionlab, New study: consumers overwhelmingly reject in-store tracking by retailers, 2014.

O. Brendan and . Connor, CreepyDOL: Cheap, distributed stalking, BlackHat, 2013.

R. Piers-o'hanlon, L. Borgaonkar, and . Hirschi, Mobile subscriber wi privacy, 2017.

J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, 802.11 user ngerprinting, 2007.

J. Pang, B. Greenstein, S. Seshan, and D. Wetherall, Tryst: The case for condential service discovery, 2007.

R. Pang, M. Allman, V. Paxson, and J. Lee, The devil and packet trace anonymization, ACM SIGCOMM Computer Communication Review, vol.36, issue.1, p.2938, 2006.
DOI : 10.1145/1111322.1111330

URL : http://www.cs.colostate.edu/~cs656/reading/pang-paxson.pdf

C. Patel, D. Shah, and A. Patel, Automatic number plate recognition system (anpr): A survey, International Journal of Computer Applications, vol.69, issue.9, 2013.
DOI : 10.5120/11871-7665

URL : http://research.ijcaonline.org/volume69/number9/pxc3887665.pdf

N. Patwari, . Sneha, and . Kasera, Robust location distinction using temporal link signatures, Proceedings of the 13th annual ACM international conference on Mobile computing and networking, p.111122, 2007.
DOI : 10.1145/1287853.1287867

URL : http://www.cs.utah.edu/~kasera/myPapers/mobicom07.pdf

S. Adam-c-polak, D. Dolatshahi, and . Goeckel, Identifying wireless users via transmitter imperfections, IEEE Journal on Selected Areas in Communications, vol.29, issue.7, p.14691479, 2011.

J. Postel, Internet control message protocol. RFC, vol.792, 1981.

. Punkingmonkey, The road less surreptitiously traveled, DEFCON, 2013.

K. Purcell, J. Brenner, and L. Rainie, Search engine use 2012. Pew Internet & American Life Project Washington, 2012.

L. Rainie and K. Zickhur, Americans' views on mobile etiquette, 2015.

A. E. , C. Redondi, D. Sanvito, and M. Cesana, Passive classication of Wi-Fi enabled devices, Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, p.5158, 2016.
DOI : 10.1145/2988287.2989161

URL : https://re.public.polimi.it/bitstream/11311/1008154/1/1570289979.pdf

. Rainey-reitman, China deputizes smart phones to spy on beijing residents' real-time location, p.2017, 2011.

P. Robyns, B. Bonné, P. Quax, and W. Lamotte, Poster: Assessing the impact of 802.11 vulnerabilities using wicability, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, p.217218

P. Robyns, B. Bonné, P. Quax, and W. Lamotte, Noncooperative 802.11 MAC layer ngerprinting and tracking of mobile devices. Security and Communication Networks, 2017.

M. Rodrig, C. Reis, R. Mahajan, D. Wetherall, J. Zahorjan et al., CRAWDAD dataset uw/sigcomm2004, 2006.

P. Sapiezynski, R. Gatej, A. Mislove, and S. Lehmann, Opportunities and challenges in crowdsourced wardriving, Proceedings of the 2015 ACM Conference on Internet Measurement Conference, p.267273, 2015.
DOI : 10.1145/2815675.2815711

URL : http://orbit.dtu.dk/en/publications/opportunities-and-challenges-in-crowdsourced-wardriving(294ed7f6-764e-4525-94e0-65054eb52488).html

J. Scott-saponas, C. Lester, S. Hartung, T. Agarwal, and . Kohno,

, Usenix Security, vol.3, p.3, 2007.

J. Scahill and G. Greenwald, The NSA's secret role in the U.S. assassination program. The Intercept, 2014.

L. Schauer, M. Werner, and P. Marcus, Estimating crowd densities and pedestrian ows using Wi-Fi and bluetooth, Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, p.171177, 2014.
DOI : 10.4108/icst.mobiquitous.2014.257870

B. Schneier, Csec surveillance analysis of ip and user data

A. Schulman, D. Levin, and N. Spring,

H. Seiwert, isni gps: Passive sning tool for capturing and visualising wi location data disclosed by ios devices, 2012.

S. Sevignani, The problem of privacy in capitalism and the alternative social networking site diaspora. tripleC: Communication, Capitalism &, Critique. Open Access Journal for a Global Sustainable Information Society, vol.10, issue.2, p.600617, 2012.

K. Sharad and G. Danezis, An automated social graph de-anonymization technique, Proceedings of the 13th Workshop on Privacy in the Electronic Society, p.4758, 2014.

E. Shari, M. Hamedi, A. Haghani, and H. Sadrsadat, Analysis of vehicle detection rate for bluetooth trac sensors: A case study in maryland and delaware, 18th World Congress on on Intelligent Transport Systems, 2011.

Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, Detecting 802.11 MAC layer spoong using received signal strength, INFOCOM 2008. The 27th Conference on Computer Communications, 2008.

S. Siby, N. Rajib-ranjan-maiti, and . Tippenhauer, Iotscanner: Detecting and classifying privacy threats in iot neighborhoods, 2017.

K. Skinner and J. Novak, Privacy and your app, Apple Worldwide Dev. Conf. (WWDC), 2015.

A. Soltani, , p.2017, 2014.

A. Soltani, Privacy trade-os in retail tracking, 2015.

C. Spensky, J. Stewart, A. Yerukhimovich, R. Shay, A. Trachtenberg et al., Sok: Privacy on mobile devicesit's complicated, Proceedings on Privacy Enhancing Technologies, vol.2016, p.96116, 2016.

. Statista, Share of adults in the united states who owned a smartphone from, 2011.

, The Guardian. City of london corporation wants 'spy bins' ditched

J. Toonstra and . Kinsner, A radio transmitter ngerprinting system odo-1, Electrical and Computer Engineering, vol.1, p.6063, 1996.

J. Turow, J. King, C. J. Hoofnagle, A. Bleakley, and M. Hennessy, Americans reject tailored advertising and three activities that enable it, Departmental Papers, 2009.

O. Ureten and N. Serinken, Wireless security through rf ngerprinting, Canadian Journal of Electrical and Computer Engineering, vol.32, issue.1, p.2733, 2007.

N. Van-dijk, Property, privacy and personhood in a world of ambient intelligence, Ethics and information technology, vol.12, issue.1, p.5769, 2010.

M. Vanhoef, C. Matte, M. Cunche, L. Cardoso, and F. Piessens, Tracking 802.11 stations without relying on the link layer identier, 2016.

M. Vanhoef, C. Matte, M. Cunche, L. Cardoso, and F. Piessens, Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms, AsiaCCS, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01282900

M. Vanhoef, C. Matte, M. Cunche, L. Cardoso, and F. Piessens, Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms, Atelier sur la Protection de la Vie Privée, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01282900

M. Vanhoef, C. Matte, M. Cunche, L. Cardoso, and F. Piessens, Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms, CITI Lab. PhD Day, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01282900

T. Dang-vo-huu, T. D. Vo-huu, and G. Noubir, Fingerprinting Wi-Fi devices using software dened radios, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, p.314, 2016.

O. Waltari and J. Kangasharju, The wireless shark: Identifying wi devices based on probe ngerprints, Proceedings of the First Workshop on Mobile Data, p.16, 2016.

B. Wang, S. Omatu, and T. Abe, Identication of the defective transmission devices using the wavelet transform, IEEE transactions on pattern analysis and machine intelligence, vol.27, p.919928, 2005.

W. Wang, Wireless networking in Windows 10, Windows Hardware Engineering Community conference (WinHEC), 2015.

D. Samuel, L. Warren, and . Brandeis, The right to privacy, Harvard law review, p.1890

M. Weigand, R. , and M. Kershaw, Build your own UAV 2.0wireless mayhem from the heavens, DEFCON, 2010.

J. Weppner, B. Bischke, and P. Lukowicz, Monitoring crowd condition in public spaces by tracking mobile consumer devices with wi interface, Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, p.13631371, 2016.

J. Weppner, P. Lukowicz, U. Blanke, and G. Tröster, Participatory bluetooth scans serving as urban crowd probes, IEEE Sensors Journal, vol.14, issue.12, pp.4196-4206, 2014.

. Alan-f-westin, Privacy and freedom, Washington and Lee Law Review, vol.25, issue.1, p.166, 1968.

. Wi-fi-alliance, Wi-Fi Simple Conguration Protocol and Usability Best Practices for the Wi-Fi Protected Setup Program, 2011.

B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos, Privacy in inter-vehicular networks: Why simple pseudonym change is not enough

, Wireless On-demand Network Systems and Services (WONS), p.176183

I. , , 2010.

G. Wilkinson, Digital terrestrial tracking: The future of surveillance, DEFCON, vol.22, 2014.

M. Woolley, Bluetooth technology protecting your privacy

J. David, A. Wu, A. Taly, D. Shankar, and . Boneh, Privacy, discovery, and authentication for the internet of things, European Symposium on Research in Computer Security, p.301319, 2016.

B. Tong-xin, Z. Guo, M. Wang, Z. Li, X. Yu et al., Freesense: Indoor human identication with Wi-Fi signals, Global Communications Conference (GLOBECOM), p.17, 2016.

Q. Xu, R. Zheng, W. Saad, and Z. Han, Device ngerprinting in wireless networks: Challenges and opportunities, IEEE Communications Surveys & Tutorials, vol.18, issue.1, p.94104, 2016.

S. Young, Bluetooth trac detectors for use as permanently installed travel time instruments, State Highway Administration Research Report, 2013.

Z. Bin-zan, M. Sun, X. Gruteser, and . Ban, Linking anonymous location traces through driving characteristics, Proceedings of the third ACM conference on Data and application security and privacy, p.293300, 2013.

, Analysis of ios 8 MAC randomization on locationing, 2015.

Y. Zeng, H. Parth, P. Pathak, and . Mohapatra, Analyzing shopper's behavior through wi signals, Proceedings of the 2nd workshop on Workshop on Physical Analytics, p.1318, 2015.

, INSA Lyon, tous droits réservés wlan_mgt