Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping
The contact-free sensing nature of Wi-Fi has been leveraged to achieve privacy breaches,
yet existing attacks relying on Wi-Fi CSI (channel state information) demand hacking Wi-Fi …
yet existing attacks relying on Wi-Fi CSI (channel state information) demand hacking Wi-Fi …
A Survey on Human Profile Information Inference via Wireless Signals
Due to the ubiquitous deployment of wireless infrastructures, the radio signal nature of
invisibility, and the elimination of the line-of-sight requirement, it has drawn increasing …
invisibility, and the elimination of the line-of-sight requirement, it has drawn increasing …
WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis
Sensitive numbers play an unparalleled role in identification and authentication. Recent
research has revealed plenty of side-channel attacks to infer keystrokes, which require …
research has revealed plenty of side-channel attacks to infer keystrokes, which require …
RefleXnoop: Passwords Snooping on NLoS Laptops Leveraging Screen-Induced Sound Reflection
Password inference attacks by covert wireless side-channels jeopardize information safety,
even for people with high security awareness and vigilance against snoopers. Yet, with …
even for people with high security awareness and vigilance against snoopers. Yet, with …
Silent thief: Password eavesdropping leveraging Wi-Fi beamforming feedback from POS terminal
Nowadays, point-of-sale (POS) terminals are no longer limited to wired connections, and
many of them rely on Wi-Fi for data transmission. While Wi-Fi provides the convenience of …
many of them rely on Wi-Fi for data transmission. While Wi-Fi provides the convenience of …
Wireless training-free keystroke inference attack and defense
Existing research work has identified a new class of attacks that can eavesdrop on the
keystrokes in a non-invasive way without infecting the target computer to install malware …
keystrokes in a non-invasive way without infecting the target computer to install malware …
E-SAWM: A Semantic Analysis-Based ODF Watermarking Algorithm for Edge Cloud Scenarios
L Zu, H Li, L Zhang, Z Lu, J Ye, X Zhao, S Hu - Future Internet, 2023 - mdpi.com
With the growing demand for data sharing file formats in financial applications driven by
open banking, the use of the OFD (open fixed-layout document) format has become …
open banking, the use of the OFD (open fixed-layout document) format has become …
WiShield: Privacy against Wi-Fi Human Tracking
Wi-Fi signals contain information about the surrounding propagation environment and have
been widely used in various sensing applications such as gesture recognition, respiratory …
been widely used in various sensing applications such as gesture recognition, respiratory …
BullyDetect: Detecting School Physical Bullying With Wi-Fi and Deep Wavelet Transformer
More than 246 million children and adolescents suffer from school violence and bullying, eg,
verbal harassment, social harassment, and physical bullying, every year, according to a …
verbal harassment, social harassment, and physical bullying, every year, according to a …
LiKey: Location-independent keystroke recognition on numeric keypads using WiFi signal
M Peng, X Fu, H Zhao, Y Wang, C Kai - Computer Networks, 2024 - Elsevier
As an application of wireless sensing, keystroke recognition can be used in a variety of
scenarios, such as password protection and analog input for devices. Existing WiFi-based …
scenarios, such as password protection and analog input for devices. Existing WiFi-based …