A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds
暂无分享,去创建一个
[1] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.
[2] Sabrina De Capitani di Vimercati,et al. Guest Editorial: Special Issue on Computer and Communications Security , 2008, TSEC.
[3] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[4] Jeff Sauro,et al. The Factor Structure of the System Usability Scale , 2009, HCI.
[5] Manfred Pinkal,et al. Acoustic Side-Channel Attacks on Printers , 2010, USENIX Security Symposium.
[6] Nitesh Saxena,et al. A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques , 2012, ASIACCS '12.
[7] Hiu Yan Fiona. Keyboard Acoustic Triangulation Attack BY Au , .
[8] Adi Shamir,et al. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis , 2014, CRYPTO.
[9] J. B. Brooke,et al. SUS: A 'Quick and Dirty' Usability Scale , 1996 .
[10] Arie Yeredor,et al. Dictionary attacks using keyboard acoustic emanations , 2006, CCS '06.
[11] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.
[12] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[13] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[14] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[15] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2005, CCS '05.
[16] Robert Fox,et al. Remote crane tamed , 1999 .
[17] G. Cybenko. Don't bring a knife to a gunfight , 2004, IEEE Security & Privacy Magazine.
[18] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[19] Yunhao Liu,et al. Context-free Attacks Using Keyboard Acoustic Emanations , 2014, CCS.