A survey on sensor-based threats and attacks to smart devices and applications
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …
lives. From small household devices to large industrial machines, smart devices have …
Deep learning-based gait recognition using smartphones in the wild
Compared to other biometrics, gait is difficult to conceal and has the advantage of being
unobtrusive. Inertial sensors, such as accelerometers and gyroscopes, are often used to …
unobtrusive. Inertial sensors, such as accelerometers and gyroscopes, are often used to …
Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns
Face authentication usually utilizes deep learning models to verify users with high accuracy.
However, it is vulnerable to various attacks that cheat the models by manipulating the digital …
However, it is vulnerable to various attacks that cheat the models by manipulating the digital …
Presspin: Enabling secure pin authentication on mobile devices via structure-borne sounds
PIN authentication is widely used on mobile devices due to its usability and simplicity.
However, it is known to be susceptible to shoulder surfing attacks, where an adversary spies …
However, it is known to be susceptible to shoulder surfing attacks, where an adversary spies …
HandLock: Enabling 2-FA for smart home voice assistants using inaudible acoustic signal
The use of voice-control technology has become mainstream and is growing worldwide.
While voice assistants provide convenience through automation and control of home …
While voice assistants provide convenience through automation and control of home …
Securing liveness detection for voice authentication via pop noises
Voice authentication has been increasingly adopted for sensitive operations on mobile
devices. While voice biometrics can distinguish individuals by their spectral features (such …
devices. While voice biometrics can distinguish individuals by their spectral features (such …
Soundid: Securing mobile two-factor authentication via acoustic signals
Mobile two-factor authentication (TFA), which uses mobile devices as a second security
layer of protection to online accounts, has been widely applied with the proliferation of …
layer of protection to online accounts, has been widely applied with the proliferation of …
Wireless training-free keystroke inference attack and defense
Existing research work has identified a new class of attacks that can eavesdrop on the
keystrokes in a non-invasive way without infecting the target computer to install malware …
keystrokes in a non-invasive way without infecting the target computer to install malware …
A systematic study of android non-sdk (hidden) service api security
Android allows apps to communicate with its system services via system service helpers so
that these apps can use various functions provided by the system services. Meanwhile, the …
that these apps can use various functions provided by the system services. Meanwhile, the …
FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction Sound
Pattern lock is widely used for user authentication in mobile devices due to its simplicity and
ease of remembering. However, it is vulnerable to various attacks, eg, shoulder surfing …
ease of remembering. However, it is vulnerable to various attacks, eg, shoulder surfing …