Event Hack Red Con 2024 starts on Oct 25, 2024, 10:00:00 AM (America/Kentucky/Louisville)
Unveiling Digital Identities
30min - Fireside Chat
Location: FireSide - 10/26/24, 3:30 PM - 10/26/24, 3:55 PM (America/Kentucky/Louisville) (25 minutes)
Unveiling Digital Identities
Aditya singh
Cybersecurity Associate I
Aditya singh
Cybersecurity Associate I

I am currently a Research intern at the Indian Institute of Technology, Bombay (IIT-B), where I am developing a Mobile Device Fingerprinting module to integrate with Suricata and Wazuh. My work involves analyzing packet inter-arrival times, and integrating web APIs to enhance network security.

I have one year of work experience in cybersecurity, during which I have made significant contributions and gained recognition through various speaking engagements and competitions:

- Speaker at Defcon Delhi 0x06: Presented my white paper on analyzing the Mirai Botnet and its derivatives.
- Speaker at IIT Bombay FOSSx : Awarded first prize for a comprehensive white paper on Suricata, competing against over 200 teams.
- Speaker at IIT Bombay Summer of Code: Presented my latest research paper, demonstrating advanced knowledge and innovative approaches in the field of cybersecurity.
- Cython Hackathon Winner at IIT Delhi: Developed a Linux kernel fuzzer, winning against more than 200 teams in a competition hosted by NTRO.


Accurately identifying and tracking users across platforms and browsers has become essential to online security and marketing tactics in the digital era. This paper explores the complex mechanisms of browser and mobile device fingerprinting, providing insight into how businesses employ these techniques to monitor and identify users. We show how unique digital fingerprints are generated by looking at a wide range of metrics, such as clock skew rate, battery status, audio configuration, time zone, canvas fingerprinting, machine characteristics, emojis, DOMrect, extensions, math functions, screen properties, TLS handshake patterns, and even favicons.

We discuss how they are combined under a single umbrella and can be used to accurately identify a user and they can either be used as a tool for improving security, Fraud detection & can also be a security & privacy risk in a lot cases.