When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
暂无分享,去创建一个
Xiaohui Liang | Mengyuan Li | Yan Meng | Yao Liu | Haojin Zhu | Junyi Liu | Na Ruan | Xiaohui Liang | Haojin Zhu | Yao Liu | Yan Meng | Mengyuan Li | Na Ruan | Junyi Liu
[1] Paul Congdon,et al. Avoiding multipath to revive inbuilding WiFi localization , 2013, MobiSys '13.
[2] C. Holt. Author's retrospective on ‘Forecasting seasonals and trends by exponentially weighted moving averages’ , 2004 .
[3] Zhen Ling,et al. Blind Recognition of Touched Keys on Mobile Devices , 2014, CCS.
[4] Giovanni Vigna,et al. ClearShot: Eavesdropping on Keyboard Input from Video , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[5] Khaled H. Hamed,et al. A modified Mann-Kendall trend test for autocorrelated data , 1998 .
[6] Rong Li,et al. Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality , 2016, Mob. Inf. Syst..
[7] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.
[8] Aleksandar Kuzmanovic,et al. Mosaic: quantifying privacy leakage in mobile networks , 2013, SIGCOMM.
[9] Xiang Cao,et al. Detecting and leveraging finger orientation for interaction with direct-touch surfaces , 2009, UIST '09.
[10] Xiangyu Liu,et al. When Good Becomes Evil: Keystroke Inference with Smartwatch , 2015, CCS.
[11] David Wetherall,et al. Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.
[12] Rajesh Kumar,et al. Beware, Your Hands Reveal Your Secrets! , 2014, CCS.
[13] Wei Wang,et al. Keystroke Recognition Using WiFi Signals , 2015, MobiCom.
[14] Wei Cheng,et al. Characterizing privacy leakage of public WiFi networks for users on travel , 2013, 2013 Proceedings IEEE INFOCOM.
[15] Jie Yang,et al. Snooping Keystrokes with mm-level Audio Ranging on a Single Phone , 2015, MobiCom.
[16] J. D. Wilson,et al. The use of cumulative monthly mean temperature anomalies in the analysis of local interannual climate variability , 1989 .
[17] Daniel J. Wigdor,et al. Direct-touch vs. mouse input for tabletop displays , 2007, CHI.
[18] Yunhao Liu,et al. Context-free Attacks Using Keyboard Acoustic Emanations , 2014, CCS.
[19] Rui Zhang,et al. VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion , 2016, NDSS.
[20] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[21] Patrick Baudisch,et al. Precise selection techniques for multi-touch screens , 2006, CHI.
[22] Michael Weber,et al. Device Names in the Wild: Investigating Privacy Risks of Zero Configuration Networking , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.
[23] Xuemin Shen,et al. An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding , 2009, IEEE INFOCOM 2009.