Uncovering user interactions on smartphones via contactless wireless charging side channels
Today, there is an increasing number of smartphones supporting wireless charging that
leverages electromagnetic induction to transmit power from a wireless charger to the …
leverages electromagnetic induction to transmit power from a wireless charger to the …
Exploiting contactless side channels in wireless charging power banks for user privacy inference via few-shot learning
Recently, power banks for smartphones have begun to support wireless charging. Although
these wireless charging power banks appear to be immune to most reported vulnerabilities …
these wireless charging power banks appear to be immune to most reported vulnerabilities …
Owl: differential-based side-channel leakage detection for CUDA applications
Y Zhao, W Xue, W Chen, W Qiang… - 2024 54th Annual …, 2024 - ieeexplore.ieee.org
Over the past decade, various methods for detecting side-channel leakage have been
proposed and proven to be effective against CPU side-channel attacks. These methods are …
proposed and proven to be effective against CPU side-channel attacks. These methods are …
[HTML][HTML] Grand theft API: A forensic analysis of vehicle cloud data
S Ebbers, S Gense, M Bakkouch, F Freiling… - Forensic Science …, 2024 - Elsevier
Modern vehicles such as cars, trucks and motorcycles contain an increasing number of
embedded computers that continuously exchange telemetry data like current mileage, tire …
embedded computers that continuously exchange telemetry data like current mileage, tire …
Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and Future Directions
Q Wang, D Oswald - ar** User Behaviors via OS Side-Channels on Smartphones
Q Wang, M Tang, J Fu - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
As the Internet of Things (IoT) continues to evolve, smartphones have become essential
components of IoT systems. However, with the increasing amount of personal information …
components of IoT systems. However, with the increasing amount of personal information …
Ghost Arbitration: Mitigating Interconnect Side-Channel Timing Attacks in GPU
Network-on-chip (NoC) is a critical shared resource in scalable multicore processors;
however, it is well-known that shared resources can lead to side-channel attacks. In this …
however, it is well-known that shared resources can lead to side-channel attacks. In this …
Non-intrusive and Unconstrained Keystroke Inference in VR Platforms via Infrared Side Channel
Virtual Reality (VR) technologies are increasingly employed in numerous applications
across various areas. Therefore, it is essential to ensure the security of interactions between …
across various areas. Therefore, it is essential to ensure the security of interactions between …
[HTML][HTML] A novel GPU based Geo-Location Inference Attack on WebGL framework
W Mai, Y **ao - High-Confidence Computing, 2023 - Elsevier
In the past few years, graphics processing units (GPUs) have become an indispensable part
of modern computer systems, not only for graphics rendering but also for intensive parallel …
of modern computer systems, not only for graphics rendering but also for intensive parallel …