Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping

J Hu, H Wang, T Zheng, J Hu, Z Chen… - Proceedings of the 2023 …, 2023 - dl.acm.org
The contact-free sensing nature of Wi-Fi has been leveraged to achieve privacy breaches,
yet existing attacks relying on Wi-Fi CSI (channel state information) demand hacking Wi-Fi …

A Survey on Human Profile Information Inference via Wireless Signals

Q He, E Yang, S Fang - IEEE Communications Surveys & …, 2024 - ieeexplore.ieee.org
Due to the ubiquitous deployment of wireless infrastructures, the radio signal nature of
invisibility, and the elimination of the line-of-sight requirement, it has drawn increasing …

WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis

E Yang, Q He, S Fang - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Sensitive numbers play an unparalleled role in identification and authentication. Recent
research has revealed plenty of side-channel attacks to infer keystrokes, which require …

RefleXnoop: Passwords Snooping on NLoS Laptops Leveraging Screen-Induced Sound Reflection

P Wang, J Hu, C Liu, J Luo - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Password inference attacks by covert wireless side-channels jeopardize information safety,
even for people with high security awareness and vigilance against snoopers. Yet, with …

Silent thief: Password eavesdropping leveraging Wi-Fi beamforming feedback from POS terminal

S Chen, H Jiang, J Hu, Z Xiao… - IEEE INFOCOM 2024 …, 2024 - ieeexplore.ieee.org
Nowadays, point-of-sale (POS) terminals are no longer limited to wired connections, and
many of them rely on Wi-Fi for data transmission. While Wi-Fi provides the convenience of …

Wireless training-free keystroke inference attack and defense

E Yang, S Fang, I Markwood, Y Liu… - IEEE/ACM …, 2022 - ieeexplore.ieee.org
Existing research work has identified a new class of attacks that can eavesdrop on the
keystrokes in a non-invasive way without infecting the target computer to install malware …

E-SAWM: A Semantic Analysis-Based ODF Watermarking Algorithm for Edge Cloud Scenarios

L Zu, H Li, L Zhang, Z Lu, J Ye, X Zhao, S Hu - Future Internet, 2023 - mdpi.com
With the growing demand for data sharing file formats in financial applications driven by
open banking, the use of the OFD (open fixed-layout document) format has become …

WiShield: Privacy against Wi-Fi Human Tracking

J Hu, H Jiang, S Chen, Q Zhang, Z Xiao… - IEEE Journal on …, 2024 - ieeexplore.ieee.org
Wi-Fi signals contain information about the surrounding propagation environment and have
been widely used in various sensing applications such as gesture recognition, respiratory …

BullyDetect: Detecting School Physical Bullying With Wi-Fi and Deep Wavelet Transformer

B Lan, F Wang, L Xia, F Nai, S Nie… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
More than 246 million children and adolescents suffer from school violence and bullying, eg,
verbal harassment, social harassment, and physical bullying, every year, according to a …

LiKey: Location-independent keystroke recognition on numeric keypads using WiFi signal

M Peng, X Fu, H Zhao, Y Wang, C Kai - Computer Networks, 2024 - Elsevier
As an application of wireless sensing, keystroke recognition can be used in a variety of
scenarios, such as password protection and analog input for devices. Existing WiFi-based …