Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Systematic classification of side-channel attacks: A case study for mobile devices
R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
Human factors in security research: Lessons learned from 2008-2018
M Kaur, M van Eeten, M Janssen, K Borgolte… - arxiv preprint arxiv …, 2021 - arxiv.org
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …
into account the human factor by studying regular users and, to a lesser extent, experts like …
Artificial intelligence misuse and concern for information privacy: New construct validation and future directions
To address various business challenges, organisations are increasingly employing artificial
intelligence (AI) to analyse vast amounts of data. One application involves consolidating …
intelligence (AI) to analyse vast amounts of data. One application involves consolidating …
Xhound: Quantifying the fingerprintability of browser extensions
O Starov, N Nikiforakis - 2017 IEEE Symposium on Security …, 2017 - ieeexplore.ieee.org
In recent years, researchers have shown that unwanted web tracking is on the rise, as
advertisers are trying to capitalize on users' online activity, using increasingly intrusive and …
advertisers are trying to capitalize on users' online activity, using increasingly intrusive and …
The web's sixth sense: A study of scripts accessing smartphone sensors
We present the first large-scale measurement of smartphone sensor API usage and
stateless tracking on the mobile web. We extend the OpenWPM web privacy measurement …
stateless tracking on the mobile web. We extend the OpenWPM web privacy measurement …
Fp-stalker: Tracking browser fingerprint evolutions
A Vastel, P Laperdrix, W Rudametkin… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Browser fingerprinting has emerged as a technique to track users without their consent.
Unlike cookies, fingerprinting is a stateless technique that does not store any information on …
Unlike cookies, fingerprinting is a stateless technique that does not store any information on …
Omnicrawl: Comprehensive measurement of web tracking with real desktop and mobile browsers
Over half of all visits to websites now take place in a mobile browser, yet the majority of web
privacy studies take the vantage point of desktop browsers, use emulated mobile browsers …
privacy studies take the vantage point of desktop browsers, use emulated mobile browsers …
Privacy threats through ultrasonic side channels on mobile devices
D Arp, E Quiring, C Wressnegger… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Device tracking is a serious threat to the privacy of users, as it enables spying on their habits
and activities. A recent practice embeds ultrasonic beacons in audio and tracks them using …
and activities. A recent practice embeds ultrasonic beacons in audio and tracks them using …
Chameleons' oblivion: Complex-valued deep neural networks for protocol-agnostic RF device fingerprinting
I Agadakos, N Agadakos, J Polakis… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Prior work has demonstrated techniques for fingerprinting devices based on their network
traffic or transmitted signals, which use software artifacts or characteristics of the underlying …
traffic or transmitted signals, which use software artifacts or characteristics of the underlying …
Decomposition of MAC address structure for granular device inference
Common among the wide variety of ubiquitous networked devices in modern use is wireless
802.11 connectivity. The MAC addresses of these devices are visible to a passive adversary …
802.11 connectivity. The MAC addresses of these devices are visible to a passive adversary …