Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems
暂无分享,去创建一个
[1] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[2] Abdelaziz Kriouile,et al. Automatic word recognition based on second-order hidden Markov models , 1994, IEEE Trans. Speech Audio Process..
[3] Arie Yeredor,et al. Dictionary attacks using keyboard acoustic emanations , 2006, CCS '06.
[4] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[5] Jonathan T. Trostle,et al. Timing attacks against trusted path , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[6] Dengguo Feng,et al. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..
[7] Jean-Jacques Quisquater,et al. A Practical Implementation of the Timing Attack , 1998, CARDIS.
[8] Dan Tsafrir,et al. Secretly Monopolizing the CPU Without Superuser Privileges , 2007, USENIX Security Symposium.
[9] L. Bergroth,et al. A survey of longest common subsequence algorithms , 2000, Proceedings Seventh International Symposium on String Processing and Information Retrieval. SPIRE 2000.
[10] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[11] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[12] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[13] G. Leech,et al. Word Frequencies in Written and Spoken English: based on the British National Corpus , 2001 .
[14] Flemming Nielson,et al. Securing Statically-verified Communications Protocols Against Timing Attacks , 2005, PASM.
[15] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2005, CCS '05.
[16] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[17] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[18] Fabian Monrose,et al. Authentication via keystroke dynamics , 1997, CCS '97.