SecTap: Secure Back of Device Input System for Mobile Devices
暂无分享,去创建一个
Ming Yang | Zhen Ling | Xinwen Fu | Junzhou Luo | Kui Wu | Yaowen Liu
[1] Xiangyu Liu,et al. When Good Becomes Evil: Keystroke Inference with Smartwatch , 2015, CCS.
[2] Giacomo Boracchi,et al. A fast eavesdropping attack against touchscreens , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[3] Jan-Michael Frahm,et al. iSpy: automatic reconstruction of typed input from compromising reflections , 2011, CCS '11.
[4] Xiaojiang Chen,et al. Cracking Android Pattern Lock in Five Attempts , 2017, NDSS.
[5] Jan-Michael Frahm,et al. Seeing double: reconstructing obscured typed input from repeated compromising reflections , 2013, CCS.
[6] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[7] Robert J. Teather,et al. FittsTilt: the application of Fitts' law to tilt-based interaction , 2012, NordiCHI.
[8] Yang Zhang,et al. Fingerprint attack against touch-enabled devices , 2012, SPSM '12.
[9] Rui Zhang,et al. Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[10] Giovanni Vigna,et al. ClearShot: Eavesdropping on Keyboard Input from Video , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[11] Patrick Baudisch,et al. Back-of-device interaction allows creating very small touch devices , 2009, CHI.
[12] Romit Roy Choudhury,et al. Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.
[13] Ross J. Anderson,et al. PIN skimmer: inferring PINs through the camera and microphone , 2013, SPSM '13.
[14] Rui Zhang,et al. VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion , 2016, NDSS.
[15] Xin Sun,et al. TextLogger: inferring longer inputs on touch screen using motion sensors , 2015, WISEC.
[16] Florian Alt,et al. Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication , 2017, CHI.
[17] Zhen Ling,et al. My Google Glass Sees Your Passwords! , 2014 .
[18] Adam J. Aviv,et al. Practicality of accelerometer side channels on smartphones , 2012, ACSAC '12.
[19] Xiaohui Liang,et al. When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals , 2016, CCS.
[20] Guevara Noubir,et al. Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning , 2014, WiSec '14.
[21] Marc Langheinrich,et al. Back-of-device authentication on smartphones , 2013, CHI.
[22] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[23] Rajesh Kumar,et al. Beware, Your Hands Reveal Your Secrets! , 2014, CCS.
[24] Michael Backes,et al. 2008 IEEE Symposium on Security and Privacy Compromising Reflections –or– How to Read LCD Monitors Around the Corner , 2022 .
[25] Zhen Ling,et al. Blind Recognition of Touched Keys on Mobile Devices , 2014, CCS.
[26] Wei Wang,et al. Keystroke Recognition Using WiFi Signals , 2015, MobiCom.
[27] Stefan Savage,et al. Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks , 2011, WOOT.
[28] Matthew Smith,et al. Now you see me, now you don't: protecting smartphone authentication from shoulder surfers , 2014, CHI.
[29] Hongyang Li,et al. Screenmilker: How to Milk Your Android Screen for Secrets , 2014, NDSS.
[30] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[31] Zhi Xu,et al. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.
[32] Raphael Spreitzer,et al. PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices , 2014, SPSM@CCS.
[33] Yunhao Liu,et al. Context-free Attacks Using Keyboard Acoustic Emanations , 2014, CCS.
[34] J. Platt. Sequential Minimal Optimization : A Fast Algorithm for Training Support Vector Machines , 1998 .
[35] Martin Welk,et al. Tempest in a Teapot: Compromising Reflections Revisited , 2009, 2009 30th IEEE Symposium on Security and Privacy.