-
2
-
-
84961346783
-
Smudge Attacks on Smartphone Touch Screens
-
USENIX Association Washington, DC, USA, 9 August 2010
-
Aviv, A.J., Gibson, K., Mossop, E., Blaze, M. & Smith, J.M., Smudge Attacks on Smartphone Touch Screens, in Proceedings of the 4th USENIX Conference on Offensive technologies, USENIX Association Washington, DC, USA, 9 August 2010, pp. 1-7, 2010.
-
(2010)
In Proceedings of the 4th USENIX Conference on Offensive technologies
, pp. 1-7
-
-
Aviv, A.J.1
Gibson, K.2
Mossop, E.3
Blaze, M.4
Smith, J.M.5
-
3
-
-
84857164924
-
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
-
Internet Society, San Diego, California, 6-9 February 2011
-
Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A. &Wang, X., Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones, in Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS), Internet Society, San Diego, California, 6-9 February 2011, pp. 17-33, 2011.
-
(2011)
In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS)
, pp. 17-33
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
4
-
-
84856645739
-
A Fast Eavesdropping Attack Against Touchscreens
-
In 2011 7th International Conference on, Mir Labs, Malacca, Malaysia, 5-8 December 2011
-
Maggi, F., Volpatto, A., Gasparini, S., Boracchi, G. & Zanero, S., A Fast Eavesdropping Attack Against Touchscreens, in Information Assurance and Security (IAS), 2011 7th International Conference on, Mir Labs, Malacca, Malaysia, 5-8 December 2011, pp. 320-325, 2011.
-
(2011)
Information Assurance and Security (IAS)
, pp. 320-325
-
-
Maggi, F.1
Volpatto, A.2
Gasparini, S.3
Boracchi, G.4
Zanero, S.5
-
5
-
-
77956382087
-
A Survey of Mobile Phone Sensing
-
Lane, N.D., Miluzzo, E., Lu, H., Peebles, D., Choudhury, T. & Campbell, A.T., A Survey of Mobile Phone Sensing, Communications Magazine, IEEE, 48, pp. 140-150, 2010.
-
(2010)
Communications Magazine, IEEE
, vol.48
, pp. 140-150
-
-
Lane, N.D.1
Miluzzo, E.2
Lu, H.3
Peebles, D.4
Choudhury, T.5
Campbell, A.T.6
-
6
-
-
84923201020
-
Defending Against Sensor-Sniffing Attacks on Mobile Phones
-
ACM, Barcelona, Spain, 16-21 August 2009
-
Cai, L., Machiraju, S. & Chen, H., Defending Against Sensor-Sniffing Attacks on Mobile Phones, in Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds, ACM, Barcelona, Spain, 16-21 August 2009, pp. 31-36, 2009.
-
(2009)
In Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds
, pp. 31-36
-
-
Cai, L.1
Machiraju, S.2
Chen, H.3
-
7
-
-
84901754744
-
-
Available at: (20 November)
-
Motion Sensors, available at: http://developer.android.com/guide/topics/ sensors/sensors_motion.html (20 November 2013).
-
(2013)
Motion Sensors
-
-
-
9
-
-
84860294696
-
Accessory: Password Inference Using Accelerometers on Smartphones
-
In, ACM, San Diego, CA, USA, 28-2 February
-
Owusu, E., Han, J., Das, S., Perrig, A. & Zhang, J., Accessory: Password Inference Using Accelerometers on Smartphones, in Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, ACM, San Diego, CA, USA, 28-29 February 2012, p. 9, 2012.
-
(2012)
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
, pp. 9
-
-
Owusu, E.1
Han, J.2
Das, S.3
Perrig, A.4
Zhang, J.5
-
10
-
-
84860679345
-
Taplogger: Inferring User Inputs on Smartphone Touchscreens Using On-Board Motion Sensors
-
ACM, Tucson, Arizona, USA, 16-18 April 2012
-
Xu, Z., Bai, K. & Zhu, S., Taplogger: Inferring User Inputs on Smartphone Touchscreens Using On-Board Motion Sensors, in Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, Tucson, Arizona, USA, 16-18 April 2012, pp. 113-124, 2012.
-
(2012)
In Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks
, pp. 113-124
-
-
Xu, Z.1
Bai, K.2
Zhu, S.3
-
11
-
-
84863091977
-
On the Practicality of Motion Based Keystroke Inference Attack
-
Cai, L. & Chen, H., On the Practicality of Motion Based Keystroke Inference Attack, in Trust and Trustworthy Computing, ed: Springer, pp. 273-290, 2012.
-
(2012)
In Trust and Trustworthy Computing, ed: Springer
, pp. 273-290
-
-
Cai, L.1
Chen, H.2
-
12
-
-
84864372370
-
Tapprints: Your Finger Taps Have Fingerprints
-
ACM, Low Wood Bay, Lake District, United Kingdom, 25-19 June 2012
-
Miluzzo, E., Varshavsky, A., Balakrishnan, S. & Choudhury, R.R., Tapprints: Your Finger Taps Have Fingerprints, in Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, ACM, Low Wood Bay, Lake District, United Kingdom, 25-19 June 2012, pp. 323-336, 2012.
-
(2012)
In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services
, pp. 323-336
-
-
Miluzzo, E.1
Varshavsky, A.2
Balakrishnan, S.3
Choudhury, R.R.4
-
13
-
-
84872119987
-
Practicality of Accelerometer Side Channels on Smartphones
-
ACM, Orlando, FL, USA, 03-07 December 2012
-
Aviv, A.J., Sapp, B., Blaze, M. & Smith, J.M., Practicality of Accelerometer Side Channels on Smartphones, in Proceedings of the 28th Annual Computer Security Applications Conference, ACM, Orlando, FL, USA, 03-07 December 2012, pp. 41-50, 2012.
-
(2012)
In Proceedings of the 28th Annual Computer Security Applications Conference
, pp. 41-50
-
-
Aviv, A.J.1
Sapp, B.2
Blaze, M.3
Smith, J.M.4
-
14
-
-
84901755076
-
On the Best Sensor for Keystrokes Inference Attack on Android
-
Al-Haiqi, A., Ismail, M. & Nordin, R., On the Best Sensor for Keystrokes Inference Attack on Android, Procedia Technology, 8, pp. 947-953, 2013.
-
(2013)
Procedia Technology
, vol.8
, pp. 947-953
-
-
Al-Haiqi, A.1
Ismail, M.2
Nordin, R.3
-
15
-
-
76749092270
-
The WEKA Data Mining Software: An Update
-
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P. & Witten, I.H., The WEKA Data Mining Software: An Update, ACM SIGKDD Explorations Newsletter, 11, pp. 10-18, 2009.
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
16
-
-
0030211964
-
Bagging Predictors
-
Breiman, L., Bagging Predictors, Machine Learning, 24, pp. 123-140, 1996.
-
(1996)
Machine Learning
, vol.24
, pp. 123-140
-
-
Breiman, L.1
-
17
-
-
3543051838
-
Functional Trees
-
Gama, J., Functional Trees, Machine Learning, 55, pp. 219-250, 2004.
-
(2004)
Machine Learning
, vol.55
, pp. 219-250
-
-
Gama, J.1
|