USB-based attacks
Attackers increasingly take advantage of innocent users who tend to use USB peripherals
casually, assuming these peripherals are benign when in fact they may carry an embedded …
casually, assuming these peripherals are benign when in fact they may carry an embedded …
In-depth survey of digital advertising technologies
Some of the world's most well-known IT companies are in fact advertising companies
deriving their primary revenues through digital advertising. For this reason, these IT giants …
deriving their primary revenues through digital advertising. For this reason, these IT giants …
Ghosttalk: Interactive attack on smartphone voice system through power line
Inaudible voice command injection is one of the most threatening attacks towards voice
assistants. Existing attacks aim at injecting the attack signals over the air, but they require …
assistants. Existing attacks aim at injecting the attack signals over the air, but they require …
A11y attacks: Exploiting accessibility in operating systems
Driven in part by federal law, accessibility (a11y) support for disabled users is becoming
ubiquitous in commodity OSs. Some assistive technologies such as natural language user …
ubiquitous in commodity OSs. Some assistive technologies such as natural language user …
Taxonomy of mobile users' security awareness
The popularity of smartphones, coupled with the amount of valuable and private information
they hold, make them attractive to attackers interested in exploiting the devices to harvest …
they hold, make them attractive to attackers interested in exploiting the devices to harvest …
{ATtention} Spanned: Comprehensive Vulnerability Analysis of {AT} Commands Within the Android Ecosystem
AT commands, originally designed in the early 80s for controlling modems, are still in use in
most modern smartphones to support telephony functions. The role of AT commands in …
most modern smartphones to support telephony functions. The role of AT commands in …
No free charge theorem: A covert channel via usb charging cable on mobile devices
More and more people are regularly using mobile and battery-powered handsets, such as
smartphones and tablets. At the same time, thanks to the technological innovation and to the …
smartphones and tablets. At the same time, thanks to the technological innovation and to the …
Lbm: A security framework for peripherals within the linux kernel
Modern computer peripherals are diverse in their capabilities and functionality, ranging from
keyboards and printers to smartphones and external GPUs. In recent years, peripherals …
keyboards and printers to smartphones and external GPUs. In recent years, peripherals …
Charging me and I know your secrets! Towards juice filming attacks on smartphones
Smartphones such as Android phones and iPhones are widely adopted worldwide and the
number of smartphone users has increased dramatically. With the popularity of …
number of smartphone users has increased dramatically. With the popularity of …
Time to rethink the design of qi standard? security and privacy vulnerability analysis of qi wireless charging
With the ever-growing deployment of Qi wireless charging for mobile devices, the potential
impact of its vulnerabilities is an increasing concern. In this paper, we conduct the first …
impact of its vulnerabilities is an increasing concern. In this paper, we conduct the first …