{LocIn}: Inferring Semantic Location from Spatial Maps in Mixed Reality
Mixed reality (MR) devices capture 3D spatial maps of users' surroundings to integrate
virtual content into their physical environment. Existing permission models implemented in …
virtual content into their physical environment. Existing permission models implemented in …
[PDF][PDF] Power-Related Side-Channel Attacks using the Android Sensor Framework
M Oberhuber, M Unterguggenberger… - … 2025: NDSS 2025, 2025 - andreaskogler.com
Software-based power side-channel attacks are a significant security threat to modern
computer systems, enabling adversaries to extract confidential information. Existing attacks …
computer systems, enabling adversaries to extract confidential information. Existing attacks …
Physical Side-Channel Attacks against Intermittent Devices
Intermittent (batteryless) devices operate solely using energy harvested from their
environment. These devices turn on when they have energy and turn off during energy …
environment. These devices turn on when they have energy and turn off during energy …
De-anonymizing VR Avatars using Non-VR Motion Side-channels
M Sabra, N Vinayaga-Sureshkanth, A Sharma… - Proceedings of the 17th …, 2024 - dl.acm.org
Virtual Reality (VR) technology offers an immersive audio-visual experience to users
through which they can interact with a digitally represented 3D space (ie, a virtual world) …
through which they can interact with a digitally represented 3D space (ie, a virtual world) …
MarcoPolo: A Zero-Permission Attack for Location Type Inference from the Magnetic Field Using Mobile Devices
B Perez, A Mehrotra, M Musolesi - International Conference on Cryptology …, 2024 - Springer
Location information extracted from mobile devices has been largely exploited to reveal our
routines, significant places, and interests, just to name a few. Given the sensitivity of the …
routines, significant places, and interests, just to name a few. Given the sensitivity of the …
MagID: Enhancing the Functionality of Off-the-Shelf Smartphones Through Magnetic Accessory Identification
J Choi, I Kim, H Kim - IEEE Access, 2024 - ieeexplore.ieee.org
Since the release of MagSafe, which allows magnetic attachment of accessories to
smartphones, many vendors have introduced various kinds of MagSafe accessories …
smartphones, many vendors have introduced various kinds of MagSafe accessories …
Leveraging Multimodal Sensing for Enhancing the Security and Privacy of Mobile Systems
H Farrukh - 2023 - search.proquest.com
Mobile systems, such as smartphones, wearables (eg, smartwatches, AR/VR headsets), and
IoT devices, have come a long way from being just a method of communication to …
IoT devices, have come a long way from being just a method of communication to …
User-Centered Data Access Control Techniques for Secure and Privacy-Aware Mobile Systems
RM Aburas - 2024 - search.proquest.com
The pervasive integration of mobile devices in today's modern world, eg, smartphones, IoT,
and mixed-reality devices, has transformed various domains, enhancing user experiences …
and mixed-reality devices, has transformed various domains, enhancing user experiences …