Keystroke recognition using wifi signals

K Ali, AX Liu, W Wang, M Shahzad - Proceedings of the 21st annual …, 2015 - dl.acm.org
Keystroke privacy is critical for ensuring the security of computer systems and the privacy of
human users as what being typed could be passwords or privacy sensitive information. In …

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

J Bonneau, C Herley, PC Van Oorschot… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …

Wi‐Fi sensing: applications and challenges

A Khalili, AH Soliman, M Asaduzzaman… - The Journal of …, 2020 - Wiley Online Library
Wi‐Fi technology has strong potentials in indoor and outdoor sensing applications; it has
several important features which makes it an appealing option compared to other sensing …

When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals

M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu… - Proceedings of the 2016 …, 2016 - dl.acm.org
In this study, we present WindTalker, a novel and practical keystroke inference framework
that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi …

[PDF][PDF] Compromising electromagnetic emanations of wired and wireless keyboards.

M Vuagnoux, S Pasini - USENIX security symposium, 2009 - usenix.org
Computer keyboards are often used to transmit confidential data such as passwords. Since
they contain electronic components, keyboards eventually emit electromagnetic waves …

On covert acoustical mesh networks in air

M Hanspach, M Goetz - arxiv preprint arxiv:1406.1213, 2014 - arxiv.org
Covert channels can be used to circumvent system and network policies by establishing
communications that have not been considered in the design of the computing system. We …

An offensive and defensive exposition of wearable computing

P Shrestha, N Saxena - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Wearable computing is rapidly getting deployed in many—commercial, medical, and
personal—domains of day-to-day life. Wearable devices appear in various forms, shapes …

Friend or foe? Your wearable devices reveal your personal pin

C Wang, X Guo, Y Wang, Y Chen, B Liu - … of the 11th ACM on Asia …, 2016 - dl.acm.org
The proliferation of wearable devices, eg, smartwatches and activity trackers, with
embedded sensors has already shown its great potential on monitoring and inferring human …

Beware, your hands reveal your secrets!

D Shukla, R Kumar, A Serwadda… - Proceedings of the 2014 …, 2014 - dl.acm.org
Research on attacks which exploit video-based side-channels to decode text typed on a
smartphone has traditionally assumed that the adversary is able to leverage some …

Improving password guessing via representation learning

D Pasquini, A Gangwal, G Ateniese… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Learning useful representations from unstructured data is one of the core challenges, as
well as a driving force, of modern data-driven approaches. Deep learning has demonstrated …