Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

[PDF][PDF] Mechanisms of Authentication toward Habitude Pattern Lock and ECG: An overview.

JL Cabra, C Parra, D Mendez… - J. Wirel. Mob. Networks …, 2022 - jowua.com
Smartphones contain access to user-sensitive information such as contacts, e-mails, e-
payments among others. Therefore, it is imperative that proper smartphone authentication …

Cracking android pattern lock in five attempts

G Ye, Z Tang, D Fang, X Chen, KI Kim… - Proceedings of the …, 2017 - eprints.whiterose.ac.uk
Pattern lock is widely used as a mechanism for authentication and authorization on Android
devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android …

Aface: Range-flexible anti-spoofing face authentication via smartphone acoustic sensing

Z Xu, T Liu, R Jiang, P Hu, Z Guo, C Liu - Proceedings of the ACM on …, 2024 - dl.acm.org
User authentication on smartphones needs to balance both security and convenience. Many
image-based face authentication methods are vulnerable to spoofing and are plagued by …

SwipePass: Acoustic-based second-factor user authentication for smartphones

Y Chen, T Ni, W Xu, T Gu - Proceedings of the ACM on Interactive …, 2022 - dl.acm.org
Pattern lock-based authentication has been widely adopted in modern smartphones.
However, this scheme relies essentially on passwords, making it vulnerable to various side …

Patternlistener: Cracking android pattern lock using acoustic signals

M Zhou, Q Wang, J Yang, Q Li, F **ao, Z Wang… - Proceedings of the …, 2018 - dl.acm.org
Pattern lock has been widely used for authentication to protect user privacy on mobile
devices (eg, smartphones and tablets). Several attacks have been constructed to crack the …

Periscope: A keystroke inference attack using human coupled electromagnetic emanations

W **, S Murali, H Zhu, M Li - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
This study presents Periscope, a novel side-channel attack that exploits human-coupled
electromagnetic (EM) emanations from touchscreens to infer sensitive inputs on a mobile …

Eyetell: Video-assisted touchscreen keystroke inference from eye movements

Y Chen, T Li, R Zhang, Y Zhang… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Keystroke inference attacks pose an increasing threat to ubiquitous mobile devices. This
paper presents EyeTell, a novel video-assisted attack that can infer a victim's keystrokes on …

A video-based attack for android pattern lock

G Ye, Z Tang, D Fang, X Chen, W Wolff… - ACM Transactions on …, 2018 - dl.acm.org
Pattern lock is widely used for identification and authentication on Android devices. This
article presents a novel video-based side channel attack that can reconstruct Android …

Draw it as shown: Behavioral pattern lock for mobile user authentication

Y Ku, LH Park, S Shin, T Kwon - IEEE Access, 2019 - ieeexplore.ieee.org
Android pattern lock is still popularly used for mobile user authentication. Unfortunately,
however, many concerns have been raised regarding its security and usability. User-created …