{LocIn}: Inferring Semantic Location from Spatial Maps in Mixed Reality
Mixed reality (MR) devices capture 3D spatial maps of users' surroundings to integrate
virtual content into their physical environment. Existing permission models implemented in …
virtual content into their physical environment. Existing permission models implemented in …
mmspy: Spying phone calls using mmwave radars
This paper presents a system mmSpy that shows the feasibility of eavesdropping phone
calls remotely. Towards this end, mmSpy performs sensing of earpiece vibrations using an …
calls remotely. Towards this end, mmSpy performs sensing of earpiece vibrations using an …
One key to rule them all: Secure group pairing for heterogeneous iot devices
Pairing schemes establish cryptographic keys to secure communication among IoT devices.
Existing pairing approaches that rely on trusted central entities, human interaction, or shared …
Existing pairing approaches that rely on trusted central entities, human interaction, or shared …
I spy you: Eavesdropping continuous speech on smartphones via motion sensors
This paper presents iSpyU, a system that shows the feasibility of recognition of natural
speech content played on a phone during conference calls (Skype, Zoom, etc) using a …
speech content played on a phone during conference calls (Skype, Zoom, etc) using a …
Istelan: Disclosing sensitive user information by mobile magnetometer from finger touches
We show a new type of side-channel leakage in which the built-in magnetometer sensor in
Apple's mobile devices captures touch events of users. When a conductive material such as …
Apple's mobile devices captures touch events of users. When a conductive material such as …
Write, attend and spell: Streaming end-to-end free-style handwriting recognition using smartwatches
Text entry on a smartwatch is challenging due to its small form factor. Handwriting
recognition using the built-in sensors of the watch (motion sensors, microphones, etc.) …
recognition using the built-in sensors of the watch (motion sensors, microphones, etc.) …
Physical Side-Channel Attacks against Intermittent Devices
Intermittent (batteryless) devices operate solely using energy harvested from their
environment. These devices turn on when they have energy and turn off during energy …
environment. These devices turn on when they have energy and turn off during energy …
Scribe: Simultaneous Voice and Handwriting Interface
This paper presents the design and implementation of Scribe, a comprehensive voice
processing and handwriting interface for voice assistants. Distinct from prior works, Scribe is …
processing and handwriting interface for voice assistants. Distinct from prior works, Scribe is …
WhisperWand: Simultaneous Voice and Gesture Tracking Interface
This paper presents the design and implementation of WhisperWand, a comprehensive
voice and motion tracking interface for voice assistants. Distinct from prior works …
voice and motion tracking interface for voice assistants. Distinct from prior works …
Physical Noninvasive Attacks on Photoplethysmogram by Computer Controlled Blood Pressure Cuff
Sensor data has been used in social security and welfare infrastructures such as insurance
and medical care to provide personalized products and services; there is a risk that attackers …
and medical care to provide personalized products and services; there is a risk that attackers …