Systematic classification of side-channel attacks: A case study for mobile devices
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
HMOG: New behavioral biometric features for continuous authentication of smartphone users
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …
Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …
storage and computational capabilities to desktop computers allowing users to store and …
Understanding shoulder surfing in the wild: Stories from users and observers
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …
attacks. However, there is little work about shoulder surfing situations in the real world. We …
When good becomes evil: Keystroke inference with smartwatch
One rising trend in today's consumer electronics is the wearable devices, eg, smartwatches.
With tens of millions of smartwatches shipped, however, the security implications of such …
With tens of millions of smartwatches shipped, however, the security implications of such …
Beware, your hands reveal your secrets!
Research on attacks which exploit video-based side-channels to decode text typed on a
smartphone has traditionally assumed that the adversary is able to leverage some …
smartphone has traditionally assumed that the adversary is able to leverage some …
Cracking android pattern lock in five attempts
Pattern lock is widely used as a mechanism for authentication and authorization on Android
devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android …
devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android …
I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics
Mobile devices have become an important part of our everyday life, harvesting more and
more confidential user information. Their portable nature and the great exposure to security …
more confidential user information. Their portable nature and the great exposure to security …
Passive non-line-of-sight imaging using optimal transport
Passive non-line-of-sight (NLOS) imaging has drawn great attention in recent years.
However, all existing methods are in common limited to simple hidden scenes, low-quality …
However, all existing methods are in common limited to simple hidden scenes, low-quality …
{Charger-Surfing}: Exploiting a power line {Side-Channel} for smartphone information leakage
Touchscreen-based mobile devices such as smartphones and tablets are used daily by
billions of people for productivity and entertainment. This paper uncovers a new security …
billions of people for productivity and entertainment. This paper uncovers a new security …