-
2
-
-
84961346783
-
Smudge attacks on smartphone touch screens
-
USENIX Association, Berkeley, CA, USA
-
Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. 2010. Smudge attacks on smartphone touch screens. In Proceedings of the 4th USENIX conference on Offensive technologies (WOOT'10). USENIX Association, Berkeley, CA, USA, 1-7
-
(2010)
Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10)
, pp. 1-7
-
-
Aviv, A.J.1
Gibson, K.2
Mossop, E.3
Blaze, M.4
Smith, J.M.5
-
3
-
-
50249171782
-
Compromising reflections-or-how to read LCD monitors around the corner
-
May 18-21
-
Michael Backes , Markus Dürmuth , Dominique Unruh, Compromising Reflections-or-How to Read LCD Monitors around the Corner, Proceedings of the 2008 IEEE Symposium on Security and Privacy, p.158-169, May 18-21, 2008
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 158-169
-
-
Backes, M.1
Dürmuth, M.2
Unruh, D.3
-
4
-
-
84962576341
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
October 04-06, Vancouver, BC, Canada
-
William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , Anmol N. Sheth, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones, Proceedings of the 9th USENIX conference on Operating systems design and implementation, p.1-6, October 04-06, 2010, Vancouver, BC, Canada
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
5
-
-
84923201020
-
Defending against sensor-sniffing attacks on mobile phones
-
ACM, New York, NY, USA
-
Liang Cai, Sridhar Machiraju, and Hao Chen. 2009. Defending against sensor-sniffing attacks on mobile phones. In Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds (MobiHeld '09). ACM, New York, NY, USA, 31-36
-
(2009)
Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds (MobiHeld '09)
, pp. 31-36
-
-
Cai, L.1
Machiraju, S.2
Chen, H.3
-
6
-
-
84970901426
-
TouchLogger: Inferring keystrokes on touch screen from smartphone motion
-
Berkeley, CA, USA, 9-9.Forman, G. 2003
-
Liang Cai and Hao Chen. 2011. TouchLogger: inferring keystrokes on touch screen from smartphone motion. In Proceedings of the 6th USENIX conference on Hot topics in security (HotSec'11). USENIX Association, Berkeley, CA, USA, 9-9.Forman, G. 2003
-
(2011)
Proceedings of the 6th USENIX Conference on Hot Topics in Security (HotSec'11). USENIX Association
-
-
Cai, L.1
Chen, H.2
-
7
-
-
84860679345
-
TapLogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors
-
ACM, New York, NY, USA
-
Zhi Xu, Kun Bai, and Sencun Zhu. 2012. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks (WISEC '12). ACM, New York, NY, USA, 113-124
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC '12)
, pp. 113-124
-
-
Xu, Z.1
Bai, K.2
Zhu, S.3
-
8
-
-
84863091977
-
On the practicality of motion based keystroke inference attack
-
Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, and Mike Reiter (Eds.). Springer-Verlag, Berlin, Heidelberg
-
Liang Cai and Hao Chen. 2012. On the practicality of motion based keystroke inference attack. In Proceedings of the 5th international conference on Trust and Trustworthy Computing (TRUST'12), Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, and Mike Reiter (Eds.). Springer-Verlag, Berlin, Heidelberg, 273-290
-
(2012)
Proceedings of the 5th International Conference on Trust and Trustworthy Computing (TRUST'12)
, pp. 273-290
-
-
Cai, L.1
Chen, H.2
-
9
-
-
84864372370
-
Tapprints: Your finger taps have fingerprints
-
ACM, New York, NY, USA
-
Emiliano Miluzzo, Alexander Varshavsky, Suhrid Balakrishnan, and Romit Roy Choudhury. 2012. Tapprints: your finger taps have fingerprints. In Proceedings of the 10th international conference on Mobile systems, applications, and services (MobiSys '12). ACM, New York, NY, USA, 323-336
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys '12)
, pp. 323-336
-
-
Miluzzo, E.1
Varshavsky, A.2
Balakrishnan, S.3
Roy Choudhury, R.4
-
10
-
-
84860294696
-
ACCessory: Password inference using accelerometers on smartphones
-
ACM, New York, NY, USA
-
Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang. 2012. ACCessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems &Applications (HotMobile '12). ACM, New York, NY, USA, Article 9 , 6 pages
-
(2012)
Proceedings of the Twelfth Workshop on Mobile Computing Systems &Applications (HotMobile '12)
, pp. 6
-
-
Owusu, E.1
Han, J.2
Das, S.3
Perrig, A.4
Zhang, J.5
-
11
-
-
84872119987
-
Practicality of accelerometer side channels on smartphones
-
ACM, New York, NY, USA
-
Adam J. Aviv, Benjamin Sapp, Matt Blaze, and Jonathan M. Smith. 2012. Practicality of accelerometer side channels on smartphones. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12). ACM, New York, NY, USA, 41-50
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12)
, pp. 41-50
-
-
Aviv, A.J.1
Sapp, B.2
Blaze, M.3
Smith, J.M.4
-
12
-
-
84975609041
-
Acoustic side-channel attacks on printers
-
August 11-13, Washington, DC
-
Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder, Acoustic side-channel attacks on printers, Proceedings of the 19th USENIX conference on Security, August 11-13, 2010, Washington, DC
-
(2010)
Proceedings of the 19th USENIX Conference on Security
-
-
Backes, M.1
Dürmuth, M.2
Gerling, S.3
Pinkal, M.4
Sporleder, C.5
-
14
-
-
85073879855
-
Gyrophone: Recognizing speech from gyroscope signals
-
Berkeley, CA, USA
-
Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: recognizing speech from gyroscope signals. In Proceedings of the 23rd USENIX conference on Security Symposium (SEC'14). USENIX Association, Berkeley, CA, USA, 1053-1067
-
(2014)
Proceedings of the 23rd USENIX Conference on Security Symposium (SEC'14). USENIX Association
, pp. 1053-1067
-
-
Michalevsky, Y.1
Boneh, D.2
Nakibly, G.3
-
15
-
-
84903220206
-
RisQ: Recognizing smoking gestures with inertial sensors on a wristband
-
ACM, New York, NY, USA
-
Abhinav Parate, Meng-Chieh Chiu, Chaniel Chadowitz, Deepak Ganesan, and Evangelos Kalogerakis. 2014. RisQ: recognizing smoking gestures with inertial sensors on a wristband. In Proceedings of the 12th annual international conference on Mobile systems, applications, and services (MobiSys '14). ACM, New York, NY, USA, 149-161
-
(2014)
Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '14)
, pp. 149-161
-
-
Parate, A.1
Chiu, M.-C.2
Chadowitz, C.3
Ganesan, D.4
Kalogerakis, E.5
-
16
-
-
84865130252
-
A new method for measuring meal intake in humans via automated wrist motion tracking
-
Y. Dong, A. Hoover, J. Scisco, and E. Muth. A new method for measuring meal intake in humans via automated wrist motion tracking. Applied psychophysiology and biofeedback, 37(3):205-215, 2012
-
(2012)
Applied Psychophysiology and Biofeedback
, vol.37
, Issue.3
, pp. 205-215
-
-
Dong, Y.1
Hoover, A.2
Scisco, J.3
Muth, E.4
-
17
-
-
79961057464
-
Using mobile phones to write in air
-
ACM, New Yo, NY, USA
-
Sandip Agrawal, Ionut Constandache, Shravan Gaonkar, Romit Roy Choudhury, Kevin Caves, and Frank DeRuyter. 2011. Using mobile phones to write in air. In Proceedings of the 9th international conference on Mobile systems, applications, and services (MobiSys '11). ACM, New Yo, NY, USA, 15-28
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys '11)
, pp. 15-28
-
-
Agrawal, S.1
Constandache, I.2
Gaonkar, S.3
Roy Choudhury, R.4
Caves, K.5
DeRuyter, F.6
-
18
-
-
84954264631
-
Turning a mobile device into a mouse in the air
-
ACM, New York, NY, USA
-
Sangki Yun, Yi-Chao Chen, and Lili Qiu. 2015. Turning a Mobile Device into a Mouse in the Air. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '15). ACM, New York, NY, USA, 15-29
-
(2015)
Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '15)
, pp. 15-29
-
-
Yun, S.1
Chen, Y.-C.2
Qiu, L.3
-
21
-
-
84960394768
-
Smart watch your taps: Side-channel keystroke inference attacks using smartwatches
-
Septmeber
-
Anindya Maiti, Murtuza Jadliwala, Jibo He, Igor Bilogrevic. Smart watch your taps: side-channel keystroke inference attacks using smartwatches. In Proceedings of the ACM Internationl Symposium on Wearable Computing (ISWC), Septmeber 2015, 27-30
-
(2015)
Proceedings of the ACM Internationl Symposium on Wearable Computing (ISWC)
, pp. 27-30
-
-
Maiti, A.1
Jadliwala, M.2
He, J.3
Bilogrevic, I.4
-
22
-
-
84954200615
-
MoLe: Motion leaks through smartwatch sensors
-
ACM, New York, NY, USA
-
He Wang, Ted Tsung-Te, and Romit Roy Choudhury. 2015. MoLe: Motion Leaks through Smartwatch Sensors. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (MobiCom '15). ACM, New York, NY, USA, 155-166
-
(2015)
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (MobiCom '15)
, pp. 155-166
-
-
Wang, H.1
Ted, T.-T.2
Roy Choudhury, R.3
-
23
-
-
85026672647
-
I sensed it was you: Authenticating mobile users with sensor-enhanced keystroke dynamics
-
July
-
K. Majdanik, C. Giuffrida, M. Conti, H. Bos,"I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics.", In Proceedings of the 11th Conference on Detection of Intrusions and Malware &Vulnerability Assessment (DIMVA 2014), July 2014
-
(2014)
Proceedings of the 11th Conference on Detection of Intrusions and Malware &Vulnerability Assessment (DIMVA 2014)
-
-
Majdanik, K.1
Giuffrida, C.2
Conti, M.3
Bos, H.4
-
24
-
-
84897817695
-
Who wears me? Bioimpedance as a passive biometric
-
Berkeley, CA, USA
-
Cory Cornelius, Jacob Sorber, Ronald Peterson, Joe Skinner, Ryan Halter, and David Kotz. 2012. Who wears me? bioimpedance as a passive biometric. In Proceedings of the 3rd USENIX conference on Health Security and Privacy (HealthSec'12). USENIX Association, Berkeley, CA, USA, 4-4
-
(2012)
Proceedings of the 3rd USENIX Conference on Health Security and Privacy (HealthSec'12). USENIX Association
, pp. 4
-
-
Cornelius, C.1
Sorber, J.2
Peterson, R.3
Skinner, J.4
Halter, R.5
Kotz, D.6
-
25
-
-
85128027253
-
Unobtrusive gait verification for mobile phones
-
ACM, New York, NY, USA
-
Hong Lu, Jonathan Huang, Tanwistha Saha, and Lama Nachman. 2014. Unobtrusive gait verification for mobile phones. In Proceedings of the 2014 ACM International Symposium on Wearable Computers (ISWC '14). ACM, New York, NY, USA, 91-98
-
(2014)
Proceedings of the 2014 ACM International Symposium on Wearable Computers (ISWC '14)
, pp. 91-98
-
-
Lu, H.1
Huang, J.2
Saha, T.3
Nachman, L.4
-
27
-
-
84864633322
-
Personalization and user verification in wearable systems using biometric walking patterns
-
(June 2012)
-
Pierluigi Casale, Oriol Pujol, and Petia Radeva. 2012. Personalization and user verification in wearable systems using biometric walking patterns. Personal Ubiquitous Comput. 16, 5 (June 2012), 563-580
-
(2012)
Personal Ubiquitous Comput
, vol.16
, Issue.5
, pp. 563-580
-
-
Casale, P.1
Pujol, O.2
Radeva, P.3
-
28
-
-
36849032870
-
Reducing shoulder-surfing by using gaze-based password entry
-
ACM, New York, NY, USA
-
Manu Kumar, Tal Garfinkel, Dan Boneh, and Terry Winograd. 2007. Reducing shoulder-surfing by using gaze-based password entry. In Proceedings of the 3rd symposium on Usable privacy and security (SOUPS '07). ACM, New York, NY, USA, 13-19
-
(2007)
Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07)
, pp. 13-19
-
-
Kumar, M.1
Garfinkel, T.2
Boneh, D.3
Winograd, T.4
|