Demystifying arm trustzone: A comprehensive survey
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …
state where ubiquitous Internet-enabled “things” will be able to generate and share large …
GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication
Although mobile devices provide access to a plethora of sensitive data, most users still only
protect them with PINs or patterns, which are vulnerable to side-channel attacks (eg …
protect them with PINs or patterns, which are vulnerable to side-channel attacks (eg …
Secloak: Arm trustzone-based mobile peripheral control
Reliable on-off control of peripherals on smart devices is a key to security and privacy in
many scenarios. Journalists want to reliably turn off radios to protect their sources during …
many scenarios. Journalists want to reliably turn off radios to protect their sources during …
Downgrade attack on trustzone
Security-critical tasks require proper isolation from untrusted software. Chip manufacturers
design and include trusted execution environments (TEEs) in their processors to secure …
design and include trusted execution environments (TEEs) in their processors to secure …
Just gaze and wave: Exploring the use of gaze and gestures for shoulder-surfing resilient authentication
Y Abdrabou, M Khamis, RM Eisa, S Ismail… - Proceedings of the 11th …, 2019 - dl.acm.org
Eye-gaze and mid-air gestures are promising for resisting various types of side-channel
attacks during authentication. However, to date, a comparison of the different authentication …
attacks during authentication. However, to date, a comparison of the different authentication …
Biometrics systems and technologies: A survey
I Buciu, A Gacsadi - … Journal of Computers Communications & Control, 2016 - univagora.ro
In a nutshell, a biometric security system requires a user to provide some biometric features
which are then verified against some stored biometric templates. Nowadays, the traditional …
which are then verified against some stored biometric templates. Nowadays, the traditional …
Biometric authentication protocols on smartphones: An overview
As biometric authentication methods become more and more common in daily life we have
seen an increased interest and developments of more convenient and secure authentication …
seen an increased interest and developments of more convenient and secure authentication …
GTmoPass: two-factor authentication on public displays using gaze-touch passwords and personal mobile devices
As public displays continue to deliver increasingly private and personalized content, there is
a need to ensure that only the legitimate users can access private information in sensitive …
a need to ensure that only the legitimate users can access private information in sensitive …
[PDF][PDF] Broken Fingers: On the Usage of the Fingerprint API in Android.
Broken Fingers: On the Usage of the Fingerprint API in Android Page 1 Broken Fingers: On the
Usage of the Fingerprint API in Android Network and Distributed System Security Symposium …
Usage of the Fingerprint API in Android Network and Distributed System Security Symposium …
A first look into users' perceptions of facial recognition in the physical world
Facial recognition (FR) technology is being adopted in both private and public spheres for a
wide range of reasons, from ensuring physical safety to providing personalized shopping …
wide range of reasons, from ensuring physical safety to providing personalized shopping …