Demystifying arm trustzone: A comprehensive survey

S Pinto, N Santos - ACM computing surveys (CSUR), 2019 - dl.acm.org
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …

GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication

M Khamis, M Hassib, E Zezschwitz, A Bulling… - Proceedings of the 19th …, 2017 - dl.acm.org
Although mobile devices provide access to a plethora of sensitive data, most users still only
protect them with PINs or patterns, which are vulnerable to side-channel attacks (eg …

Secloak: Arm trustzone-based mobile peripheral control

M Lentz, R Sen, P Druschel… - Proceedings of the 16th …, 2018 - dl.acm.org
Reliable on-off control of peripherals on smart devices is a key to security and privacy in
many scenarios. Journalists want to reliably turn off radios to protect their sources during …

Downgrade attack on trustzone

Y Chen, Y Zhang, Z Wang, T Wei - arXiv preprint arXiv:1707.05082, 2017 - arxiv.org
Security-critical tasks require proper isolation from untrusted software. Chip manufacturers
design and include trusted execution environments (TEEs) in their processors to secure …

Just gaze and wave: Exploring the use of gaze and gestures for shoulder-surfing resilient authentication

Y Abdrabou, M Khamis, RM Eisa, S Ismail… - Proceedings of the 11th …, 2019 - dl.acm.org
Eye-gaze and mid-air gestures are promising for resisting various types of side-channel
attacks during authentication. However, to date, a comparison of the different authentication …

Biometrics systems and technologies: A survey

I Buciu, A Gacsadi - … Journal of Computers Communications & Control, 2016 - univagora.ro
In a nutshell, a biometric security system requires a user to provide some biometric features
which are then verified against some stored biometric templates. Nowadays, the traditional …

Biometric authentication protocols on smartphones: An overview

M Stokkenes, R Ramachandra, C Busch - Proceedings of the 9th …, 2016 - dl.acm.org
As biometric authentication methods become more and more common in daily life we have
seen an increased interest and developments of more convenient and secure authentication …

GTmoPass: two-factor authentication on public displays using gaze-touch passwords and personal mobile devices

M Khamis, R Hasholzner, A Bulling, F Alt - Proceedings of the 6th ACM …, 2017 - dl.acm.org
As public displays continue to deliver increasingly private and personalized content, there is
a need to ensure that only the legitimate users can access private information in sensitive …

[PDF][PDF] Broken Fingers: On the Usage of the Fingerprint API in Android.

A Bianchi, Y Fratantonio, A Machiry, C Kruegel… - NDSS, 2018 - pdfs.semanticscholar.org
Broken Fingers: On the Usage of the Fingerprint API in Android Page 1 Broken Fingers: On the
Usage of the Fingerprint API in Android Network and Distributed System Security Symposium …

A first look into users' perceptions of facial recognition in the physical world

S Seng, MN Al-Ameen, M Wright - Computers & Security, 2021 - Elsevier
Facial recognition (FR) technology is being adopted in both private and public spheres for a
wide range of reasons, from ensuring physical safety to providing personalized shopping …