A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

Deep learning-based gait recognition using smartphones in the wild

Q Zou, Y Wang, Q Wang, Y Zhao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Compared to other biometrics, gait is difficult to conceal and has the advantage of being
unobtrusive. Inertial sensors, such as accelerometers and gyroscopes, are often used to …

Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns

M Zhou, Q Wang, Q Li, W Zhou… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Face authentication usually utilizes deep learning models to verify users with high accuracy.
However, it is vulnerable to various attacks that cheat the models by manipulating the digital …

Presspin: Enabling secure pin authentication on mobile devices via structure-borne sounds

M Zhou, Q Wang, X Lin, Y Zhao, P Jiang… - … on Dependable and …, 2022 - ieeexplore.ieee.org
PIN authentication is widely used on mobile devices due to its usability and simplicity.
However, it is known to be susceptible to shoulder surfing attacks, where an adversary spies …

HandLock: Enabling 2-FA for smart home voice assistants using inaudible acoustic signal

S Zhang, A Das - Proceedings of the 24th International Symposium on …, 2021 - dl.acm.org
The use of voice-control technology has become mainstream and is growing worldwide.
While voice assistants provide convenience through automation and control of home …

Securing liveness detection for voice authentication via pop noises

P Jiang, Q Wang, X Lin, M Zhou, W Ding… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Voice authentication has been increasingly adopted for sensitive operations on mobile
devices. While voice biometrics can distinguish individuals by their spectral features (such …

Soundid: Securing mobile two-factor authentication via acoustic signals

D Liu, Q Wang, M Zhou, P Jiang, Q Li… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Mobile two-factor authentication (TFA), which uses mobile devices as a second security
layer of protection to online accounts, has been widely applied with the proliferation of …

Wireless training-free keystroke inference attack and defense

E Yang, S Fang, I Markwood, Y Liu… - IEEE/ACM …, 2022 - ieeexplore.ieee.org
Existing research work has identified a new class of attacks that can eavesdrop on the
keystrokes in a non-invasive way without infecting the target computer to install malware …

A systematic study of android non-sdk (hidden) service api security

Y He, Y Gu, P Su, K Sun, Y Zhou… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Android allows apps to communicate with its system services via system service helpers so
that these apps can use various functions provided by the system services. Meanwhile, the …

FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction Sound

M Zhou, Y Zhou, S Su, Q Wang, Q Li… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Pattern lock is widely used for user authentication in mobile devices due to its simplicity and
ease of remembering. However, it is vulnerable to various attacks, eg, shoulder surfing …