A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

Does deidentification of data from wearable devices give us a false sense of security? A systematic review

L Chikwetu, Y Miao, MK Woldetensae, D Bell… - The Lancet Digital …, 2023 - thelancet.com
Wearable devices have made it easier to generate and share data collected on individuals.
This systematic review seeks to investigate whether deidentifying data from wearable …

Peek-a-boo: I see your smart home activities, even encrypted!

A Acar, H Fereidooni, T Abera, AK Sikder… - Proceedings of the 13th …, 2020 - dl.acm.org
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment
allow users to easily control the physical world around them and facilitate their living styles …

SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

That person moves like a car: Misclassification attack detection for autonomous systems using spatiotemporal consistency

Y Man, R Muller, M Li, ZB Celik, R Gerdes - 32nd USENIX Security …, 2023 - usenix.org
Autonomous systems commonly rely on object detection and tracking (ODT) to perceive the
environment and predict the trajectory of surrounding objects for planning purposes. An …

A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification

N Ghose, K Gupta, L Lazos, M Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Two-factor authentication provides an additional layer of protection to commonly-occurring
password breaches. However, existing TFA methods, often involve special hardware …

Continuous authentication through gait analysis on a wrist-worn device

G Cola, A Vecchio, M Avvenuti - Pervasive and Mobile Computing, 2021 - Elsevier
Being distinctive of every individual, gait can be used as a biometric feature to authenticate
the owner of a wearable device. This paper proposes and evaluates an authentication …

A Classifications Framework for Continuous Biometric Authentication (2018-2024)

D Boshoff, GP Hancke - Computers & Security, 2024 - Elsevier
The increase in personal devices, the amount of private and sensitive information these
devices store/process, and the importance of this information have introduced vital security …

Watchauth: User authentication and intent recognition in mobile payments using a smartwatch

J Sturgess, S Eberz, I Sluganovic… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
In this paper, we show that the tap gesture, performed when a user 'taps'a smartwatch onto
an NFC-enabled terminal to make a payment, is a biometric capable of implicitly …