Systematic classification of side-channel attacks: A case study for mobile devices
R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
Surveying the development of biometric user authentication on mobile phones
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …
important task to protect users' private information and data. Since biometric approaches can …
Security vulnerabilities of internet of things: A case study of the smart plug system
With the rapid development of the Internet of Things, more and more small devices are
connected into the Internet for monitoring and control purposes. One such type of devices …
connected into the Internet for monitoring and control purposes. One such type of devices …
Silentsense: silent user identification via touch and movement behavioral biometrics
In this work, we present SilentSense, a framework to authenticate users silently and
transparently by exploiting the user touch behavior biometrics and leveraging the integrated …
transparently by exploiting the user touch behavior biometrics and leveraging the integrated …
A pilot study on the security of pattern screen-lock methods and soft side channel attacks
Graphical passwords that allow a user to unlock a smartphone's screen are one of the
Android operating system's features and many users prefer them instead of traditional text …
Android operating system's features and many users prefer them instead of traditional text …
[PDF][PDF] Screenmilker: How to Milk Your Android Screen for Secrets.
With the rapid increase in Android device popularity, the capabilities that the diverse user
base demands from Android have significantly exceeded its original design. As a result …
base demands from Android have significantly exceeded its original design. As a result …
Blind recognition of touched keys on mobile devices
In this paper, we introduce a novel computer vision based attack that automatically discloses
inputs on a touch-enabled device while the attacker cannot see any text or popup in a video …
inputs on a touch-enabled device while the attacker cannot see any text or popup in a video …
The fall of one, the rise of many: a survey on multi-biometric fusion methods
LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel
Recently, in-display fingerprint sensors have been widely adopted in newly-released
smartphones. However, we find this new technique can leak information about the user's …
smartphones. However, we find this new technique can leak information about the user's …
Seeing double: Reconstructing obscured typed input from repeated compromising reflections
Of late, threats enabled by the ubiquitous use of mobile devices have drawn much interest
from the research community. However, prior threats all suffer from a similar, and profound …
from the research community. However, prior threats all suffer from a similar, and profound …