CrossSense: Towards cross-site and large-scale WiFi sensing

J Zhang, Z Tang, M Li, D Fang, P Nurmi… - Proceedings of the 24th …, 2018 - dl.acm.org
We present CrossSense, a novel system for scaling up WiFi sensing to new environments
and larger problems. To reduce the cost of sensing model training data collection …

Survey and systematization of secure device pairing

M Fomichev, F Alvarez, D Steinmetzer… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …

{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound

N Karapanos, C Marforio, C Soriente… - 24th USENIX security …, 2015 - usenix.org
Two-factor authentication protects online accounts even if passwords are leaked. Most
users, however, prefer password-only authentication. One reason why twofactor …

On addressing RFID/NFC-based relay attacks: An overview

YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …

Context-based zero-interaction pairing and key evolution for advanced personal devices

M Miettinen, N Asokan, TD Nguyen… - Proceedings of the …, 2014 - dl.acm.org
Solutions for pairing devices without prior security associations typically require users to
actively take part in the pairing process of the devices. Scenarios involving new types of …

Drone to the rescue: Relay-resilient authentication using ambient multi-sensing

B Shrestha, N Saxena, HTT Truong… - … Conference on Financial …, 2014 - Springer
Many mobile and wireless authentication systems are prone to relay attacks whereby two
non co-presence colluding entities can subvert the authentication functionality by simply …

UWB with pulse reordering: Securing ranging against relay and physical-layer attacks

M Singh, P Leu, S Capkun - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Physical-layer attacks allow attackers to manipulate (spoof) ranging and positioning. These
attacks had real-world impact and allowed car thefts, executions of unauthorized payments …

The sounds of the phones: Dangers of zero-effort second factor login based on ambient audio

B Shrestha, M Shirvanian, P Shrestha… - Proceedings of the 2016 …, 2016 - dl.acm.org
Reducing user burden underlying traditional two-factor authentication constitutes an
important research effort. An interesting representative approach, Sound-Proof, leverages …

2ma: Verifying voice commands via two microphone authentication

L Blue, H Abdullah, L Vargas, P Traynor - Proceedings of the 2018 on …, 2018 - dl.acm.org
Voice controlled interfaces have vastly improved the usability of many devices (eg, headless
IoT systems). Unfortunately, the lack of authentication for these interfaces has also …

Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …