Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks

[1]  Xiaohui Liang,et al.  When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals , 2016, CCS.

[2]  Xiangyu Liu,et al.  When Good Becomes Evil: Keystroke Inference with Smartwatch , 2015, CCS.

[3]  Xiangyu Liu,et al.  Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections , 2015, ESORICS.

[4]  He Wang,et al.  MoLe: Motion Leaks through Smartwatch Sensors , 2015, MobiCom.

[5]  Haibo Chen,et al.  You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps , 2015, USENIX Security Symposium.

[6]  Hyoungshick Kim,et al.  Keyboard or keylogger?: A security analysis of third-party keyboards on Android , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).

[7]  Xin Sun,et al.  TextLogger: inferring longer inputs on touch screen using motion sensors , 2015, WISEC.

[8]  Xiang Cai,et al.  Fixing Races For Good: Portable and Reliable UNIX File-System Race Detection , 2015, AsiaCCS.

[9]  Wenke Lee,et al.  A11y Attacks: Exploiting Accessibility in Operating Systems , 2014, CCS.

[10]  Guevara Noubir,et al.  Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning , 2014, WiSec '14.

[11]  Xiangyu Liu,et al.  Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone , 2014, SPSM@CCS.

[12]  Raphael Spreitzer,et al.  PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices , 2014, SPSM@CCS.

[13]  Fadi Mohsen,et al.  Android keylogging threat , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[14]  Ross J. Anderson,et al.  PIN skimmer: inferring PINs through the camera and microphone , 2013, SPSM '13.

[15]  Rui Wang,et al.  Unauthorized origin crossing on mobile platforms: threats and mitigation , 2013, CCS.

[16]  Adam J. Aviv,et al.  Practicality of accelerometer side channels on smartphones , 2012, ACSAC '12.

[17]  Collin Mulliner,et al.  Read It Twice! A Mass-Storage-Based TOCTTOU Attack , 2012, WOOT.

[18]  Romit Roy Choudhury,et al.  Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.

[19]  Salvatore J. Stolfo,et al.  Concurrency attacks , 2012, HotPar'12.

[20]  Zhi Xu,et al.  TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.

[21]  Jun Han,et al.  ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.

[22]  Hao Chen,et al.  TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.

[23]  Apu Kapadia,et al.  Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.

[24]  Tomer Hertz,et al.  Portably solving file races with hardness amplification , 2008, TOS.

[25]  Tomer Hertz,et al.  Portably Solving File TOCTTOU Races with Hardness Amplification , 2008, FAST.

[26]  Calton Pu,et al.  TOCTTOU vulnerabilities in UNIX-style file systems: an anatomical study , 2005, FAST'05.