Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks
暂无分享,去创建一个
Xiangyu Liu | Zhou Li | Zhe Zhou | Kehuan Zhang | Wenrui Diao | Rui Liu | Zhe Zhou | Kehuan Zhang | Zhou Li | Wenrui Diao | Xiangyu Liu | Rui Liu
[1] Xiaohui Liang,et al. When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals , 2016, CCS.
[2] Xiangyu Liu,et al. When Good Becomes Evil: Keystroke Inference with Smartwatch , 2015, CCS.
[3] Xiangyu Liu,et al. Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections , 2015, ESORICS.
[4] He Wang,et al. MoLe: Motion Leaks through Smartwatch Sensors , 2015, MobiCom.
[5] Haibo Chen,et al. You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps , 2015, USENIX Security Symposium.
[6] Hyoungshick Kim,et al. Keyboard or keylogger?: A security analysis of third-party keyboards on Android , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).
[7] Xin Sun,et al. TextLogger: inferring longer inputs on touch screen using motion sensors , 2015, WISEC.
[8] Xiang Cai,et al. Fixing Races For Good: Portable and Reliable UNIX File-System Race Detection , 2015, AsiaCCS.
[9] Wenke Lee,et al. A11y Attacks: Exploiting Accessibility in Operating Systems , 2014, CCS.
[10] Guevara Noubir,et al. Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning , 2014, WiSec '14.
[11] Xiangyu Liu,et al. Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone , 2014, SPSM@CCS.
[12] Raphael Spreitzer,et al. PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices , 2014, SPSM@CCS.
[13] Fadi Mohsen,et al. Android keylogging threat , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[14] Ross J. Anderson,et al. PIN skimmer: inferring PINs through the camera and microphone , 2013, SPSM '13.
[15] Rui Wang,et al. Unauthorized origin crossing on mobile platforms: threats and mitigation , 2013, CCS.
[16] Adam J. Aviv,et al. Practicality of accelerometer side channels on smartphones , 2012, ACSAC '12.
[17] Collin Mulliner,et al. Read It Twice! A Mass-Storage-Based TOCTTOU Attack , 2012, WOOT.
[18] Romit Roy Choudhury,et al. Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.
[19] Salvatore J. Stolfo,et al. Concurrency attacks , 2012, HotPar'12.
[20] Zhi Xu,et al. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.
[21] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[22] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[23] Apu Kapadia,et al. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.
[24] Tomer Hertz,et al. Portably solving file races with hardness amplification , 2008, TOS.
[25] Tomer Hertz,et al. Portably Solving File TOCTTOU Races with Hardness Amplification , 2008, FAST.
[26] Calton Pu,et al. TOCTTOU vulnerabilities in UNIX-style file systems: an anatomical study , 2005, FAST'05.