The threat of offensive ai to organizations
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …
data, and synthesize media that is nearly indistinguishable from the real thing. However …
Commodity WiFi sensing in ten years: Status, challenges, and opportunities
The prevalence of WiFi devices and ubiquitous coverage of WiFi networks provide us the
opportunity to extend WiFi capabilities beyond communication, particularly in sensing the …
opportunity to extend WiFi capabilities beyond communication, particularly in sensing the …
Device-free gesture tracking using acoustic signals
Device-free gesture tracking is an enabling HCI mechanism for small wearable devices
because fingers are too big to control the GUI elements on such small screens, and it is also …
because fingers are too big to control the GUI elements on such small screens, and it is also …
Fingerio: Using active sonar for fine-grained finger tracking
We present fingerIO, a novel fine-grained finger tracking solution for around-device
interaction. FingerIO does not require instrumenting the finger with sensors and works even …
interaction. FingerIO does not require instrumenting the finger with sensors and works even …
Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication
Voice biometrics is drawing increasing attention as it is a promising alternative to legacy
passwords for mobile authentication. Recently, a growing body of work shows that voice …
passwords for mobile authentication. Recently, a growing body of work shows that voice …
Personal voice assistant security and privacy—a survey
Personal voice assistants (PVAs) are increasingly used as interfaces to digital environments.
Voice commands are used to interact with phones, smart homes, or cars. In the United …
Voice commands are used to interact with phones, smart homes, or cars. In the United …
An indirect eavesdrop** attack of keystrokes on touch screen through acoustic sensing
This paper demonstrates the feasibility of a side-channel attack to infer keystrokes on touch
screen leveraging an off-the-shelf smartphone. Although there exist some studies on …
screen leveraging an off-the-shelf smartphone. Although there exist some studies on …
mmVib: micrometer-level vibration measurement with mmwave radar
Vibration measurement is a crucial task in industrial systems, where vibration characteristics
reflect the health and indicate anomalies of the objects. Previous approaches either work in …
reflect the health and indicate anomalies of the objects. Previous approaches either work in …
Voicelive: A phoneme localization based liveness detection for voice authentication on smartphones
Voice authentication is drawing increasing attention and becomes an attractive alternative to
passwords for mobile authentication. Recent advances in mobile technology further …
passwords for mobile authentication. Recent advances in mobile technology further …
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals
In this study, we present WindTalker, a novel and practical keystroke inference framework
that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi …
that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi …