POWERFUL: Mobile app fingerprinting via power analysis
暂无分享,去创建一个
Rui Zhang | Yanchao Zhang | Yimin Chen | Xiaocong Jin | Jingchao Sun | Jingchao Sun | Yanchao Zhang | Rui Zhang | X. Jin | Yimin Chen
[1] Marco Zuniga,et al. NEAT: a novel energy analysis toolkit for free-roaming smartphones , 2014, SenSys.
[2] Rui Zhang,et al. VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion , 2016, NDSS.
[3] Yong Liao,et al. AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic , 2015, PAM.
[4] Dawn Xiaodong Song,et al. NetworkProfiler: Towards automatic fingerprinting of Android apps , 2013, 2013 Proceedings IEEE INFOCOM.
[5] Zhuoqing Morley Mao,et al. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks , 2014, USENIX Security Symposium.
[6] Vitaly Shmatikov,et al. Memento: Learning Secrets from Process Footprints , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] Aiko M. Hormann,et al. Programs for Machine Learning. Part I , 1962, Inf. Control..
[8] Klara Nahrstedt,et al. Identity, location, disease and more: inferring your secrets from android public resources , 2013, CCS.
[9] Paramvir Bahl,et al. Fine-grained power modeling for smartphones using system call tracing , 2011, EuroSys '11.
[10] Qiang Xu,et al. Automatic generation of mobile app signatures from traffic observations , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[11] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[12] Johan A. K. Suykens,et al. Least Squares Support Vector Machine Classifiers , 1999, Neural Processing Letters.
[13] Luca Ardito,et al. Profiling Power Consumption on Mobile Devices , 2013 .
[14] Tin Kam Ho,et al. The Random Subspace Method for Constructing Decision Forests , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[15] Zhi Xu,et al. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.
[16] Ming Zhang,et al. Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof , 2012, EuroSys '12.
[17] Apu Kapadia,et al. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.
[18] Jun Han,et al. ACComplice: Location inference using accelerometers on smartphones , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[19] Lei Yang,et al. Accurate online power estimation and automatic battery behavior based power model generation for smartphones , 2010, 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[20] XiaoFeng Wang,et al. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems , 2009, USENIX Security Symposium.
[21] Gabi Nakibly,et al. PowerSpy: Location Tracking Using Mobile Device Power Analysis , 2015, USENIX Security Symposium.
[22] Romit Roy Choudhury,et al. SurroundSense: mobile phone localization via ambience fingerprinting , 2009, MobiCom '09.
[23] Wenbo He,et al. I know what you did on your smartphone: Inferring app usage over encrypted data traffic , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[24] Hao Chen,et al. On the Practicality of Motion Based Keystroke Inference Attack , 2012, TRUST.
[25] Nitesh V. Chawla,et al. Information Gain, Correlation and Support Vector Machines , 2006, Feature Extraction.
[26] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[27] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[28] Nino Vincenzo Verde,et al. No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.
[29] Ivan Martinovic,et al. Who do you sync you are?: smartphone fingerprinting via application behaviour , 2013, WiSec '13.
[30] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[31] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .