Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Systematic classification of side-channel attacks: A case study for mobile devices
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
[PDF][PDF] Mechanisms of Authentication toward Habitude Pattern Lock and ECG: An overview.
Smartphones contain access to user-sensitive information such as contacts, e-mails, e-
payments among others. Therefore, it is imperative that proper smartphone authentication …
payments among others. Therefore, it is imperative that proper smartphone authentication …
Cracking android pattern lock in five attempts
Pattern lock is widely used as a mechanism for authentication and authorization on Android
devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android …
devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android …
Aface: Range-flexible anti-spoofing face authentication via smartphone acoustic sensing
User authentication on smartphones needs to balance both security and convenience. Many
image-based face authentication methods are vulnerable to spoofing and are plagued by …
image-based face authentication methods are vulnerable to spoofing and are plagued by …
SwipePass: Acoustic-based second-factor user authentication for smartphones
Pattern lock-based authentication has been widely adopted in modern smartphones.
However, this scheme relies essentially on passwords, making it vulnerable to various side …
However, this scheme relies essentially on passwords, making it vulnerable to various side …
Patternlistener: Cracking android pattern lock using acoustic signals
Pattern lock has been widely used for authentication to protect user privacy on mobile
devices (eg, smartphones and tablets). Several attacks have been constructed to crack the …
devices (eg, smartphones and tablets). Several attacks have been constructed to crack the …
Periscope: A keystroke inference attack using human coupled electromagnetic emanations
This study presents Periscope, a novel side-channel attack that exploits human-coupled
electromagnetic (EM) emanations from touchscreens to infer sensitive inputs on a mobile …
electromagnetic (EM) emanations from touchscreens to infer sensitive inputs on a mobile …
Eyetell: Video-assisted touchscreen keystroke inference from eye movements
Keystroke inference attacks pose an increasing threat to ubiquitous mobile devices. This
paper presents EyeTell, a novel video-assisted attack that can infer a victim's keystrokes on …
paper presents EyeTell, a novel video-assisted attack that can infer a victim's keystrokes on …
A video-based attack for android pattern lock
Pattern lock is widely used for identification and authentication on Android devices. This
article presents a novel video-based side channel attack that can reconstruct Android …
article presents a novel video-based side channel attack that can reconstruct Android …
Draw it as shown: Behavioral pattern lock for mobile user authentication
Android pattern lock is still popularly used for mobile user authentication. Unfortunately,
however, many concerns have been raised regarding its security and usability. User-created …
however, many concerns have been raised regarding its security and usability. User-created …