Introduction.- Types and Origins of Fingerprints.- Device Measurement and Origin of Variation.- Crypto-based Methods and Fingerprints.- Fingerprinting by Design: Embedding and Authentication.- Digital Fingerprint: A Practical Hardware Security Primitive.- Operating System Fingerprinting.- Secure and Trustworthy Provenance Collection for Digital Forensics.- Conclusion.
Ryan M. Gerdes is an assistant professor of Electrical and Computer Engineering at Virginia Polytechnic Institute. His interests include signal and data authentication, hardware and device security, computer and network security, transportation security, and applied electromagnetics.
Yong Guan is an associate professor at Iowa State University. His research and teaching are in computer networks and distributed systems, with focuses on security issues, including computer and network forensics, wireless and sensor network security, privacy-enhancing technologies for the Internet, and secure real-time computing and communication.
Sneha Kumar Kasera is a professor in the School of Computing at the University of Utah. Before joining the University of Utah, he spent four years in the Mobile Networking Research Department at Bell Labs, Lucent Technologies. Earlier, I obtained a Ph.D. in Computer Science from the Advanced Networks Research Group at the University of Massachusetts in Amherst.
Cliff Wang is the program director at US Army Research Office, managing a large portfolio of university research. He is also appointed as an adjunct professor at North Carolina State University. Dr. Wang is a fellow of IEEE.