-
1
-
-
84888998673
-
-
"Samsung KNOX." https://www.samsung.com/global/business/mobile/ solution/security/samsung-knox.
-
Samsung KNOX
-
-
-
3
-
-
84874487052
-
-
"Xen project." http://www.xen.org/.
-
Xen Project
-
-
-
5
-
-
84889019060
-
-
"Trustzone: Arm." http://www.arm.com/products/processors/ technologies/trustzone.php.
-
Trustzone: Arm
-
-
-
6
-
-
84870428915
-
-
"Google play." https://play.google.com/store.
-
Google Play
-
-
-
9
-
-
84889032562
-
-
"Gfan." http://bbs.gfan.com.
-
Gfan
-
-
-
10
-
-
84888992869
-
-
"eoemarket." http://www.eoemarket.com.
-
Eoemarket
-
-
-
18
-
-
85180406770
-
PlaceRaider: Virtual theft in physical spaces with smartphones
-
R. Templeman, Z. Rahman, D. Crandall, and A. Kapadia, "PlaceRaider: Virtual theft in physical spaces with smartphones," in Proceedings of The 20th Annual Network and Distributed System Security Symposium (NDSS), Feb 2013.
-
Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS), Feb 2013
-
-
Templeman, R.1
Rahman, Z.2
Crandall, D.3
Kapadia, A.4
-
21
-
-
84870651248
-
-
"Tor project." https://www.torproject.org/.
-
Tor Project
-
-
-
23
-
-
84889031442
-
-
"Rageagaisntthecage." http://thesnkchrmr.wordpress.com/2011/03/ 24/rageagainstthecage/.
-
Rageagaisntthecage
-
-
-
26
-
-
84889075663
-
-
G. Roth, "Homography." http://people.scs.carleton.ca/~c-shu/ Courses/comp4900d/notes/homography.pdf, 2013.
-
(2013)
Homography
-
-
Roth, G.1
-
27
-
-
84889025595
-
-
"OpenCv." http://opencv.willowgarage.com/wiki.
-
OpenCv
-
-
-
32
-
-
85022008254
-
-
author = John Koetsier, September
-
"Pin analysis." http://www.datagenetics.com/blog/ september32012/, author = John Koetsier, September 2013.
-
(2013)
Pin Analysis
-
-
-
34
-
-
84889007250
-
-
"Sensor j android developers." http://developer.android.com/ reference/android/hardware/Sensor.html.
-
Sensor J Android Developers
-
-
-
36
-
-
2342553334
-
Ten strikes and you're out": Increasing the number of login attempts can improve password usability
-
John Wiley
-
S. Brostoff and M. A. Sasse, ""ten strikes and you're out": Increasing the number of login attempts can improve password usability," in CHI Workshop on HCI and Security Systems, John Wiley, 2003.
-
(2003)
CHI Workshop on HCI and Security Systems
-
-
Brostoff, S.1
Sasse, M.A.2
-
37
-
-
84855802608
-
Pico: No more passwords!
-
Springer-Verlag
-
F. Stajano, "Pico: no more passwords!," in Proceedings of the 19th international conference on Security Protocols, SP'11, (Berlin, Heidelberg), pp. 49-81, Springer-Verlag, 2011.
-
(2011)
Proceedings of the 19th International Conference on Security Protocols, SP'11, (Berlin, Heidelberg)
, pp. 49-81
-
-
Stajano, F.1
-
38
-
-
85066372453
-
Progressive authentication: Deciding when to authenticate on mobile phones
-
USENIX Association
-
O. Riva, C. Qin, K. Strauss, and D. Lymberopoulos, "Progressive authentication: deciding when to authenticate on mobile phones," in Proceedings of the 21st USENIX conference on Security symposium, Security'12, (Berkeley, CA, USA), pp. 15-15, USENIX Association, 2012.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium, Security'12, (Berkeley, CA, USA)
, pp. 15-15
-
-
Riva, O.1
Qin, C.2
Strauss, K.3
Lymberopoulos, D.4
-
39
-
-
84889053849
-
Poster: Fast, automatic iphone shoulder surfing
-
ACM
-
S. Maggi, A. Volpatto, S. Gasparini, G. Boracchi, and S. Zanero, "Poster: fast, automatic iphone shoulder surfing," in Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, (New York, NY, USA), pp. 805-808, ACM, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, (New York, NY, USA)
, pp. 805-808
-
-
Maggi, S.1
Volpatto, A.2
Gasparini, S.3
Boracchi, G.4
Zanero, S.5
-
40
-
-
80755168323
-
ispy: Automatic reconstruction of typed input from compromising reflections
-
ACM
-
R. Raguram, A. M. White, D. Goswami, F. Monrose, and J.-M. Frahm, "ispy: automatic reconstruction of typed input from compromising reflections," in Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, (New York, NY, USA), pp. 527-536, ACM, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, (New York, NY, USA)
, pp. 527-536
-
-
Raguram, R.1
White, A.M.2
Goswami, D.3
Monrose, F.4
Frahm, J.-M.5
-
41
-
-
84961346783
-
Smudge attacks on smartphone touch screens
-
USENIX Association
-
A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, "Smudge attacks on smartphone touch screens," in Proceedings of the 4th USENIX conference on Offensive technologies, WOOT'10, pp. 1-7, USENIX Association, 2010.
-
(2010)
Proceedings of the 4th USENIX Conference on Offensive Technologies, WOOT'10
, pp. 1-7
-
-
Aviv, A.J.1
Gibson, K.2
Mossop, E.3
Blaze, M.4
Smith, J.M.5
-
42
-
-
80755143996
-
(sp)iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
-
ACM
-
P. Marquardt, A. Verma, H. Carter, and P. Traynor, "(sp)iphone: decoding vibrations from nearby keyboards using mobile phone accelerometers," in Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, (New York, NY, USA), pp. 551-562, ACM, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, (New York, NY, USA)
, pp. 551-562
-
-
Marquardt, P.1
Verma, A.2
Carter, H.3
Traynor, P.4
-
43
-
-
84860679345
-
Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors
-
ACM
-
Z. Xu, K. Bai, and S. Zhu, "Taplogger: inferring user inputs on smartphone touchscreens using on-board motion sensors," in Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, (New York, NY, USA), pp. 113-124, ACM, 2012.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, (New York, NY, USA)
, pp. 113-124
-
-
Xu, Z.1
Bai, K.2
Zhu, S.3
-
44
-
-
84970901426
-
Touchlogger: Inferring keystrokes on touch screen from smartphone motion
-
USENIX Association
-
L. Cai and H. Chen, "Touchlogger: inferring keystrokes on touch screen from smartphone motion," in Proceedings of the 6th USENIX conference on Hot topics in security, HotSec'11, (Berkeley, CA, USA), pp. 9-9, USENIX Association, 2011.
-
(2011)
Proceedings of the 6th USENIX Conference on Hot Topics in Security, HotSec'11, (Berkeley, CA, USA)
, pp. 9-9
-
-
Cai, L.1
Chen, H.2
-
45
-
-
84863091977
-
On the practicality of motion based keystroke inference attack
-
Springer-Verlag
-
L. Cai and H. Chen, "On the practicality of motion based keystroke inference attack," in Proceedings of the 5th international conference on Trust and Trustworthy Computing, TRUST'12, (Berlin, Heidelberg), pp. 273-290, Springer-Verlag, 2012.
-
(2012)
Proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST'12, (Berlin, Heidelberg)
, pp. 273-290
-
-
Cai, L.1
Chen, H.2
-
46
-
-
84872119987
-
Practicality of accelerometer side channels on smartphones
-
ACM
-
A. J. Aviv, B. Sapp, M. Blaze, and J. M. Smith, "Practicality of accelerometer side channels on smartphones," in Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12, (New York, NY, USA), pp. 41-50, ACM, 2012.
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12, (New York, NY, USA)
, pp. 41-50
-
-
Aviv, A.J.1
Sapp, B.2
Blaze, M.3
Smith, J.M.4
-
47
-
-
84864372370
-
Tapprints: Your finger taps have fingerprints
-
ACM
-
E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury, "Tapprints: your finger taps have fingerprints," in Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys '12, (New York, NY, USA), pp. 323-336, ACM, 2012.
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, MobiSys '12, (New York, NY, USA)
, pp. 323-336
-
-
Miluzzo, E.1
Varshavsky, A.2
Balakrishnan, S.3
Choudhury, R.R.4
|