Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

HMOG: New behavioral biometric features for continuous authentication of smartphone users

Z Sitová, J Šeděnka, Q Yang, G Peng… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

Understanding shoulder surfing in the wild: Stories from users and observers

M Eiband, M Khamis, E Von Zezschwitz… - Proceedings of the …, 2017 - dl.acm.org
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …

When good becomes evil: Keystroke inference with smartwatch

X Liu, Z Zhou, W Diao, Z Li, K Zhang - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
One rising trend in today's consumer electronics is the wearable devices, eg, smartwatches.
With tens of millions of smartwatches shipped, however, the security implications of such …

Beware, your hands reveal your secrets!

D Shukla, R Kumar, A Serwadda… - Proceedings of the 2014 …, 2014 - dl.acm.org
Research on attacks which exploit video-based side-channels to decode text typed on a
smartphone has traditionally assumed that the adversary is able to leverage some …

Cracking android pattern lock in five attempts

G Ye, Z Tang, D Fang, X Chen, KI Kim… - Proceedings of the …, 2017 - eprints.whiterose.ac.uk
Pattern lock is widely used as a mechanism for authentication and authorization on Android
devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android …

I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics

C Giuffrida, K Majdanik, M Conti, H Bos - … 2014, Egham, UK, July 10-11 …, 2014 - Springer
Mobile devices have become an important part of our everyday life, harvesting more and
more confidential user information. Their portable nature and the great exposure to security …

Passive non-line-of-sight imaging using optimal transport

R Geng, Y Hu, Z Lu, C Yu, H Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Passive non-line-of-sight (NLOS) imaging has drawn great attention in recent years.
However, all existing methods are in common limited to simple hidden scenes, low-quality …

{Charger-Surfing}: Exploiting a power line {Side-Channel} for smartphone information leakage

P Cronin, X Gao, C Yang, H Wang - 30th USENIX Security Symposium …, 2021 - usenix.org
Touchscreen-based mobile devices such as smartphones and tablets are used daily by
billions of people for productivity and entertainment. This paper uncovers a new security …