Don ’ t touch a word ! A practical input eavesdropping attack against mobile touchscreen devices
暂无分享,去创建一个
[1] J. G. Semple,et al. Algebraic Projective Geometry , 1953 .
[2] H. M. Karara,et al. Direct Linear Transformation from Comparator Coordinates into Object Space Coordinates in Close-Range Photogrammetry , 2015 .
[3] N. Otsu. A threshold selection method from gray level histograms , 1979 .
[4] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[5] I. Johnstone,et al. Ideal spatial adaptation by wavelet shrinkage , 1994 .
[6] Bernhard P. Wrobel,et al. Multiple View Geometry in Computer Vision , 2001 .
[7] Andrew Zisserman,et al. Multiple View Geometry in Computer Vision (2nd ed) , 2003 .
[8] Massimo Piccardi,et al. Background subtraction techniques: a review , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[9] Desney S. Tan,et al. Spy-resistant keyboard: more secure password entry on public touch screen displays , 2005, OZCHI.
[10] Tal Garfinkel,et al. Reducing shoulder-surfing by using gaze-based password entry , 2007, SOUPS '07.
[11] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[12] Giovanni Vigna,et al. ClearShot: Eavesdropping on Keyboard Input from Video , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[13] Engin Kirda,et al. A View on Current Malware Behaviors , 2009, LEET.
[14] Tyler Moore,et al. Information security: where computer science, economics and psychology meet , 2009, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[15] Roberto Brunelli,et al. Template Matching Techniques in Computer Vision: Theory and Practice , 2009 .
[16] J. P. Lewis. Fast Normalized Cross-Correlation , 2010 .