Keystroke recognition using wifi signals
Keystroke privacy is critical for ensuring the security of computer systems and the privacy of
human users as what being typed could be passwords or privacy sensitive information. In …
human users as what being typed could be passwords or privacy sensitive information. In …
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …
authentication on the web using a broad set of twenty-five usability, deployability and …
Wi‐Fi sensing: applications and challenges
A Khalili, AH Soliman, M Asaduzzaman… - The Journal of …, 2020 - Wiley Online Library
Wi‐Fi technology has strong potentials in indoor and outdoor sensing applications; it has
several important features which makes it an appealing option compared to other sensing …
several important features which makes it an appealing option compared to other sensing …
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals
In this study, we present WindTalker, a novel and practical keystroke inference framework
that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi …
that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi …
[PDF][PDF] Compromising electromagnetic emanations of wired and wireless keyboards.
Computer keyboards are often used to transmit confidential data such as passwords. Since
they contain electronic components, keyboards eventually emit electromagnetic waves …
they contain electronic components, keyboards eventually emit electromagnetic waves …
On covert acoustical mesh networks in air
M Hanspach, M Goetz - arxiv preprint arxiv:1406.1213, 2014 - arxiv.org
Covert channels can be used to circumvent system and network policies by establishing
communications that have not been considered in the design of the computing system. We …
communications that have not been considered in the design of the computing system. We …
An offensive and defensive exposition of wearable computing
Wearable computing is rapidly getting deployed in many—commercial, medical, and
personal—domains of day-to-day life. Wearable devices appear in various forms, shapes …
personal—domains of day-to-day life. Wearable devices appear in various forms, shapes …
Friend or foe? Your wearable devices reveal your personal pin
The proliferation of wearable devices, eg, smartwatches and activity trackers, with
embedded sensors has already shown its great potential on monitoring and inferring human …
embedded sensors has already shown its great potential on monitoring and inferring human …
Beware, your hands reveal your secrets!
Research on attacks which exploit video-based side-channels to decode text typed on a
smartphone has traditionally assumed that the adversary is able to leverage some …
smartphone has traditionally assumed that the adversary is able to leverage some …
Improving password guessing via representation learning
Learning useful representations from unstructured data is one of the core challenges, as
well as a driving force, of modern data-driven approaches. Deep learning has demonstrated …
well as a driving force, of modern data-driven approaches. Deep learning has demonstrated …