Publications
Users Pay Twice - The Hidden Energy Cost of Web Advertising
Samuel Pélissier, Naif Mehanna, Sterenn Roux, Quentin Perez, Walter Rudametkin, Johann Bourcier, Pierre Laperdrix
A more accessible/fancy version of this work is available here. Abstract Since the first online ad in 1994, advertising has grown into a vast ecosystem delivering billions of ads daily. Advertisements...
read articleGotta Catch’em all - On the Web Tracking Practices of a Deal-Sharing Conglomerate and their Heavy Reliance on Redirect Chain
Sterenn Roux, Samuel Pélissier, Johann Bourcier, Walter Rudametkin, Pierre Laperdrix, Naif Mehanna
Affiliate marketing is a growing performance-based marketing arrangement in which affiliates are rewarded for getting users to register, purchase, or visit a shopping website. This marketing strategy...
read articleEfficiently linking LoRaWAN identifiers through multi-domain fingerprinting
Samuel Pélissier, Abhishek Kumar Mishra, Mathieu Cunche, Vincent Roca, Didier Donsez
LoRaWAN is a leading IoT technology worldwide, increasingly integrated into pervasive computing environments through a growing number of sensors in various industrial and consumer applications....
read articleEnhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short?
Samuel Pélissier, Gianluca Anselmi, Abhishek Kumar, Anna Maria Mandalari, Mathieu Cunche
Recent years have seen widespread adoption of consumer Internet of Things (IoT) devices, offering diverse benefits to end-users, from smart homes to healthcare monitoring, but raising serious privacy...
read articleFingerprinting connected Wi-Fi devices using per-network MAC addresses
Abhishek Kumar Mishra, Samuel Pélissier, Mathieu Cunche
Wi-Fi stands out as one of the most prominent and widespread wireless technologies in use today. Smartphones and various other Wi-Fi-enabled devices employ management frames called probe-requests to...
read articlePrivacy-preserving pseudonyms for LoRaWAN
Samuel Pélissier, Jan Aalmoes, Abhishek Kumar Mishra, Mathieu Cunche, Vincent Roca, Didier Donsez
LoRaWAN, a widely deployed LPWAN protocol, raises privacy concerns due to metadata exposure, particularly concerning the exploitation of stable device identifiers. For the first time in literature, we...
read articleDevice re-identification in LoRaWAN through messages linkage
Samuel Pélissier, Mathieu Cunche, Vincent Roca, Didier Donsez
In LoRaWAN networks, devices are identified by two identifiers: a globally unique and stable one called DevEUI, and an ephemeral and randomly assigned pseudonym called DevAddr. The association between...
read articleShadow Banning in Browser-based Volunteering Computing
Samuel Pélissier, Lucas Dupont, Dorian Lefeuvre, Nicolas Guillois
Browser-based volunteering computing projects are mainly used to perform scientific computations in heterogeneous clusters at a low cost. As for every community-driven approach, saboteurs can try to...
read article