USB-based attacks

N Nissim, R Yahalom, Y Elovici - Computers & Security, 2017 - Elsevier
Attackers increasingly take advantage of innocent users who tend to use USB peripherals
casually, assuming these peripherals are benign when in fact they may carry an embedded …

In-depth survey of digital advertising technologies

G Chen, JH Cox, AS Uluagac… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Some of the world's most well-known IT companies are in fact advertising companies
deriving their primary revenues through digital advertising. For this reason, these IT giants …

Ghosttalk: Interactive attack on smartphone voice system through power line

Y Wang, H Guo, Q Yan - arxiv preprint arxiv:2202.02585, 2022 - arxiv.org
Inaudible voice command injection is one of the most threatening attacks towards voice
assistants. Existing attacks aim at injecting the attack signals over the air, but they require …

A11y attacks: Exploiting accessibility in operating systems

Y Jang, C Song, SP Chung, T Wang… - Proceedings of the 2014 …, 2014 - dl.acm.org
Driven in part by federal law, accessibility (a11y) support for disabled users is becoming
ubiquitous in commodity OSs. Some assistive technologies such as natural language user …

Taxonomy of mobile users' security awareness

R Bitton, A Finkelshtein, L Sidi, R Puzis, L Rokach… - Computers & …, 2018 - Elsevier
The popularity of smartphones, coupled with the amount of valuable and private information
they hold, make them attractive to attackers interested in exploiting the devices to harvest …

{ATtention} Spanned: Comprehensive Vulnerability Analysis of {AT} Commands Within the Android Ecosystem

DJ Tian, G Hernandez, JI Choi, V Frost… - 27th USENIX security …, 2018 - usenix.org
AT commands, originally designed in the early 80s for controlling modems, are still in use in
most modern smartphones to support telephony functions. The role of AT commands in …

No free charge theorem: A covert channel via usb charging cable on mobile devices

R Spolaor, L Abudahi, V Moonsamy, M Conti… - … and Network Security …, 2017 - Springer
More and more people are regularly using mobile and battery-powered handsets, such as
smartphones and tablets. At the same time, thanks to the technological innovation and to the …

Lbm: A security framework for peripherals within the linux kernel

DJ Tian, G Hernandez, JI Choi, V Frost… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Modern computer peripherals are diverse in their capabilities and functionality, ranging from
keyboards and printers to smartphones and external GPUs. In recent years, peripherals …

Charging me and I know your secrets! Towards juice filming attacks on smartphones

W Meng, WH Lee, SR Murali… - Proceedings of the 1st …, 2015 - dl.acm.org
Smartphones such as Android phones and iPhones are widely adopted worldwide and the
number of smartphone users has increased dramatically. With the popularity of …

Time to rethink the design of qi standard? security and privacy vulnerability analysis of qi wireless charging

Y Wu, Z Li, N Van Nostrand, J Liu - … of the 37th Annual Computer Security …, 2021 - dl.acm.org
With the ever-growing deployment of Qi wireless charging for mobile devices, the potential
impact of its vulnerabilities is an increasing concern. In this paper, we conduct the first …