Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

Security vulnerabilities of internet of things: A case study of the smart plug system

Z Ling, J Luo, Y Xu, C Gao, K Wu… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
With the rapid development of the Internet of Things, more and more small devices are
connected into the Internet for monitoring and control purposes. One such type of devices …

Silentsense: silent user identification via touch and movement behavioral biometrics

C Bo, L Zhang, XY Li, Q Huang, Y Wang - Proceedings of the 19th …, 2013 - dl.acm.org
In this work, we present SilentSense, a framework to authenticate users silently and
transparently by exploiting the user touch behavior biometrics and leveraging the integrated …

A pilot study on the security of pattern screen-lock methods and soft side channel attacks

P Andriotis, T Tryfonas, G Oikonomou… - Proceedings of the sixth …, 2013 - dl.acm.org
Graphical passwords that allow a user to unlock a smartphone's screen are one of the
Android operating system's features and many users prefer them instead of traditional text …

[PDF][PDF] Screenmilker: How to Milk Your Android Screen for Secrets.

CC Lin, H Li, X Zhou, XF Wang - NDSS, 2014 - Citeseer
With the rapid increase in Android device popularity, the capabilities that the diverse user
base demands from Android have significantly exceeded its original design. As a result …

Blind recognition of touched keys on mobile devices

Q Yue, Z Ling, X Fu, B Liu, K Ren, W Zhao - Proceedings of the 2014 …, 2014 - dl.acm.org
In this paper, we introduce a novel computer vision based attack that automatically discloses
inputs on a touch-enabled device while the attacker cannot see any text or popup in a video …

The fall of one, the rise of many: a survey on multi-biometric fusion methods

LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …

Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel

T Ni, X Zhang, Q Zhao - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Recently, in-display fingerprint sensors have been widely adopted in newly-released
smartphones. However, we find this new technique can leak information about the user's …

Seeing double: Reconstructing obscured typed input from repeated compromising reflections

Y Xu, J Heinly, AM White, F Monrose… - Proceedings of the 2013 …, 2013 - dl.acm.org
Of late, threats enabled by the ubiquitous use of mobile devices have drawn much interest
from the research community. However, prior threats all suffer from a similar, and profound …