A survey on sensor-based threats and attacks to smart devices and applications
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …
lives. From small household devices to large industrial machines, smart devices have …
Does deidentification of data from wearable devices give us a false sense of security? A systematic review
Wearable devices have made it easier to generate and share data collected on individuals.
This systematic review seeks to investigate whether deidentifying data from wearable …
This systematic review seeks to investigate whether deidentifying data from wearable …
Peek-a-boo: I see your smart home activities, even encrypted!
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment
allow users to easily control the physical world around them and facilitate their living styles …
allow users to easily control the physical world around them and facilitate their living styles …
SoK: cryptojacking malware
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …
That person moves like a car: Misclassification attack detection for autonomous systems using spatiotemporal consistency
Autonomous systems commonly rely on object detection and tracking (ODT) to perceive the
environment and predict the trajectory of surrounding objects for planning purposes. An …
environment and predict the trajectory of surrounding objects for planning purposes. An …
A systematic literature review on latest keystroke dynamics based models
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …
recent studies on the implications of keystroke dynamics (KD) patterns in user …
ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification
Two-factor authentication provides an additional layer of protection to commonly-occurring
password breaches. However, existing TFA methods, often involve special hardware …
password breaches. However, existing TFA methods, often involve special hardware …
Continuous authentication through gait analysis on a wrist-worn device
Being distinctive of every individual, gait can be used as a biometric feature to authenticate
the owner of a wearable device. This paper proposes and evaluates an authentication …
the owner of a wearable device. This paper proposes and evaluates an authentication …
A Classifications Framework for Continuous Biometric Authentication (2018-2024)
D Boshoff, GP Hancke - Computers & Security, 2024 - Elsevier
The increase in personal devices, the amount of private and sensitive information these
devices store/process, and the importance of this information have introduced vital security …
devices store/process, and the importance of this information have introduced vital security …
Watchauth: User authentication and intent recognition in mobile payments using a smartwatch
In this paper, we show that the tap gesture, performed when a user 'taps'a smartwatch onto
an NFC-enabled terminal to make a payment, is a biometric capable of implicitly …
an NFC-enabled terminal to make a payment, is a biometric capable of implicitly …