CrossSense: Towards cross-site and large-scale WiFi sensing
We present CrossSense, a novel system for scaling up WiFi sensing to new environments
and larger problems. To reduce the cost of sensing model training data collection …
and larger problems. To reduce the cost of sensing model training data collection …
Survey and systematization of secure device pairing
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …
communications among smart devices, both personal mobile devices and Internet of Things …
{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound
Two-factor authentication protects online accounts even if passwords are leaked. Most
users, however, prefer password-only authentication. One reason why twofactor …
users, however, prefer password-only authentication. One reason why twofactor …
On addressing RFID/NFC-based relay attacks: An overview
YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …
through wireless means. When a relay attack between a honest prover and a honest verifier …
Context-based zero-interaction pairing and key evolution for advanced personal devices
Solutions for pairing devices without prior security associations typically require users to
actively take part in the pairing process of the devices. Scenarios involving new types of …
actively take part in the pairing process of the devices. Scenarios involving new types of …
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing
Many mobile and wireless authentication systems are prone to relay attacks whereby two
non co-presence colluding entities can subvert the authentication functionality by simply …
non co-presence colluding entities can subvert the authentication functionality by simply …
UWB with pulse reordering: Securing ranging against relay and physical-layer attacks
Physical-layer attacks allow attackers to manipulate (spoof) ranging and positioning. These
attacks had real-world impact and allowed car thefts, executions of unauthorized payments …
attacks had real-world impact and allowed car thefts, executions of unauthorized payments …
The sounds of the phones: Dangers of zero-effort second factor login based on ambient audio
Reducing user burden underlying traditional two-factor authentication constitutes an
important research effort. An interesting representative approach, Sound-Proof, leverages …
important research effort. An interesting representative approach, Sound-Proof, leverages …
2ma: Verifying voice commands via two microphone authentication
Voice controlled interfaces have vastly improved the usability of many devices (eg, headless
IoT systems). Unfortunately, the lack of authentication for these interfaces has also …
IoT systems). Unfortunately, the lack of authentication for these interfaces has also …
Adversary models for mobile device authentication
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
a vast range of methods proposed and analyzed. In related areas, such as secure channel …