Eyetell: Video-assisted touchscreen keystroke inference from eye movements

Y Chen, T Li, R Zhang, Y Zhang… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Keystroke inference attacks pose an increasing threat to ubiquitous mobile devices. This
paper presents EyeTell, a novel video-assisted attack that can infer a victim's keystrokes on …

IDeAuth: A novel behavioral biometric-based implicit deauthentication scheme for smartphones

S Gupta, R Kumar, M Kacimi, B Crispo - Pattern Recognition Letters, 2022 - Elsevier
Many studies have shown that single entry-point authentication schemes for smartphones
can easily be circumvented. IDeAuth is an implicit deauthentication scheme that aims to …

Proximity-proof: Secure and usable mobile two-factor authentication

D Han, Y Chen, T Li, R Zhang, Y Zhang… - Proceedings of the 24th …, 2018 - dl.acm.org
Mobile two-factor authentication (2FA) has become commonplace along with the popularity
of mobile devices. Current mobile 2FA solutions all require some form of user effort which …

Your face your heart: Secure mobile face authentication with photoplethysmograms

Y Chen, J Sun, X Jin, T Li, R Zhang… - IEEE INFOCOM 2017 …, 2017 - ieeexplore.ieee.org
Face authentication emerges as a powerful method for preventing unauthorized access to
mobile devices. It is, however, vulnerable to photo-based forgery attacks (PFA) and …

Short-range audio channels security: Survey of mechanisms, applications, and research challenges

M Caprolu, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Short-range audio channels have appealing distinguishing characteristics: ease of use, low
deployment costs, and easy to tune frequencies, to cite a few. Moreover, thanks to their …

LocID: A secure and usable location-based smartphone unlocking scheme using Wi-Fi signals and light intensity

MA Alawami, AR Vinay, H Kim - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
A user's location information can be used to identify the user. For example, in Android, we
can keep our smartphone unlocked when it is located near a place that was previously …

WearLock: unlocking your phone via acoustics using smartwatch

S Yi, Z Qin, N Carter, Q Li - 2017 IEEE 37th International …, 2017 - ieeexplore.ieee.org
Smartphone lock screens are implemented to reduce the risk of data loss or compromise
given the fact that increasing amount of person data are accessible on smartphones …

Chaperone: Real-time locking and loss prevention for smartphones

J Chen, U Hengartner, H Khan, M Mannan - 29th USENIX Security …, 2020 - usenix.org
Smartphone loss affects millions of users each year and causes significant monetary and
data losses. Device tracking services (eg, Google's" Find My Device") enable the device …

Towards usable and secure location-based smartphone authentication

G Cho, S Kwag, JH Huh, B Kim, CH Lee… - … Symposium on Usable …, 2021 - usenix.org
The concept of using location information to unlock smartphones is widely available on
Android phones. To date, however, not much research has been conducted on investigating …

Method and apparatus for authenticating a user of a computing device

Y Chen, Y Zhang - US Patent 11,580,203, 2023 - Google Patents
2019-04-30 Assigned to ARIZONA BOARD OF REGENTS ON BEHALF OF ARIZONA STATE
UNIVERSITY reassignment ARIZONA BOARD OF REGENTS ON BEHALF OF ARIZONA …