Eyetell: Video-assisted touchscreen keystroke inference from eye movements
Keystroke inference attacks pose an increasing threat to ubiquitous mobile devices. This
paper presents EyeTell, a novel video-assisted attack that can infer a victim's keystrokes on …
paper presents EyeTell, a novel video-assisted attack that can infer a victim's keystrokes on …
IDeAuth: A novel behavioral biometric-based implicit deauthentication scheme for smartphones
Many studies have shown that single entry-point authentication schemes for smartphones
can easily be circumvented. IDeAuth is an implicit deauthentication scheme that aims to …
can easily be circumvented. IDeAuth is an implicit deauthentication scheme that aims to …
Proximity-proof: Secure and usable mobile two-factor authentication
Mobile two-factor authentication (2FA) has become commonplace along with the popularity
of mobile devices. Current mobile 2FA solutions all require some form of user effort which …
of mobile devices. Current mobile 2FA solutions all require some form of user effort which …
Your face your heart: Secure mobile face authentication with photoplethysmograms
Face authentication emerges as a powerful method for preventing unauthorized access to
mobile devices. It is, however, vulnerable to photo-based forgery attacks (PFA) and …
mobile devices. It is, however, vulnerable to photo-based forgery attacks (PFA) and …
Short-range audio channels security: Survey of mechanisms, applications, and research challenges
M Caprolu, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Short-range audio channels have appealing distinguishing characteristics: ease of use, low
deployment costs, and easy to tune frequencies, to cite a few. Moreover, thanks to their …
deployment costs, and easy to tune frequencies, to cite a few. Moreover, thanks to their …
LocID: A secure and usable location-based smartphone unlocking scheme using Wi-Fi signals and light intensity
MA Alawami, AR Vinay, H Kim - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
A user's location information can be used to identify the user. For example, in Android, we
can keep our smartphone unlocked when it is located near a place that was previously …
can keep our smartphone unlocked when it is located near a place that was previously …
WearLock: unlocking your phone via acoustics using smartwatch
Smartphone lock screens are implemented to reduce the risk of data loss or compromise
given the fact that increasing amount of person data are accessible on smartphones …
given the fact that increasing amount of person data are accessible on smartphones …
Chaperone: Real-time locking and loss prevention for smartphones
Smartphone loss affects millions of users each year and causes significant monetary and
data losses. Device tracking services (eg, Google's" Find My Device") enable the device …
data losses. Device tracking services (eg, Google's" Find My Device") enable the device …
Towards usable and secure location-based smartphone authentication
The concept of using location information to unlock smartphones is widely available on
Android phones. To date, however, not much research has been conducted on investigating …
Android phones. To date, however, not much research has been conducted on investigating …
Method and apparatus for authenticating a user of a computing device
Y Chen, Y Zhang - US Patent 11,580,203, 2023 - Google Patents
2019-04-30 Assigned to ARIZONA BOARD OF REGENTS ON BEHALF OF ARIZONA STATE
UNIVERSITY reassignment ARIZONA BOARD OF REGENTS ON BEHALF OF ARIZONA …
UNIVERSITY reassignment ARIZONA BOARD OF REGENTS ON BEHALF OF ARIZONA …