Uncovering user interactions on smartphones via contactless wireless charging side channels

T Ni, X Zhang, C Zuo, J Li, Z Yan… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Today, there is an increasing number of smartphones supporting wireless charging that
leverages electromagnetic induction to transmit power from a wireless charger to the …

Exploiting contactless side channels in wireless charging power banks for user privacy inference via few-shot learning

T Ni, J Li, X Zhang, C Zuo, W Wang, W Xu… - Proceedings of the 29th …, 2023 - dl.acm.org
Recently, power banks for smartphones have begun to support wireless charging. Although
these wireless charging power banks appear to be immune to most reported vulnerabilities …

Owl: differential-based side-channel leakage detection for CUDA applications

Y Zhao, W Xue, W Chen, W Qiang… - 2024 54th Annual …, 2024 - ieeexplore.ieee.org
Over the past decade, various methods for detecting side-channel leakage have been
proposed and proven to be effective against CPU side-channel attacks. These methods are …

[HTML][HTML] Grand theft API: A forensic analysis of vehicle cloud data

S Ebbers, S Gense, M Bakkouch, F Freiling… - Forensic Science …, 2024 - Elsevier
Modern vehicles such as cars, trucks and motorcycles contain an increasing number of
embedded computers that continuously exchange telemetry data like current mileage, tire …

Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and Future Directions

Q Wang, D Oswald - ar** User Behaviors via OS Side-Channels on Smartphones
Q Wang, M Tang, J Fu - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
As the Internet of Things (IoT) continues to evolve, smartphones have become essential
components of IoT systems. However, with the increasing amount of personal information …

Ghost Arbitration: Mitigating Interconnect Side-Channel Timing Attacks in GPU

Z **, J Ahn, J Kim, H Kasan, J Song… - 2024 57th IEEE/ACM …, 2024 - ieeexplore.ieee.org
Network-on-chip (NoC) is a critical shared resource in scalable multicore processors;
however, it is well-known that shared resources can lead to side-channel attacks. In this …

Non-intrusive and Unconstrained Keystroke Inference in VR Platforms via Infrared Side Channel

T Ni, Y Du, Q Zhao, C Wang - arxiv preprint arxiv:2412.14815, 2024 - arxiv.org
Virtual Reality (VR) technologies are increasingly employed in numerous applications
across various areas. Therefore, it is essential to ensure the security of interactions between …

[HTML][HTML] A novel GPU based Geo-Location Inference Attack on WebGL framework

W Mai, Y **ao - High-Confidence Computing, 2023 - Elsevier
In the past few years, graphics processing units (GPUs) have become an indispensable part
of modern computer systems, not only for graphics rendering but also for intensive parallel …