Systematic classification of side-channel attacks: A case study for mobile devices
R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence …
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-
organized and skilled adversary to remain undetected while systematically and continuously …
organized and skilled adversary to remain undetected while systematically and continuously …
Replacement autoencoder: A privacy-preserving algorithm for sensory data analysis
An increasing number of sensors on mobile, Internet of things (IoT), and wearable devices
generate time-series measurements of physical activities. Though access to the sensory …
generate time-series measurements of physical activities. Though access to the sensory …
Understanding human-chosen pins: characteristics, distribution and security
Personal Identification Numbers (PINs) are ubiquitously used in embedded computing
systems where user input interfaces are constrained. Yet, little attention has been paid to this …
systems where user input interfaces are constrained. Yet, little attention has been paid to this …
Javascript zero: Real javascript and zero side-channel attacks
Modern web browsers are ubiquitously used by billions of users, connecting them to the
world wide web. From the other side, web browsers do not only provide a unified interface …
world wide web. From the other side, web browsers do not only provide a unified interface …
[PDF][PDF] JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits.
Today, more and more web browsers and extensions provide anonymity features to hide
user details. Primarily used to evade tracking by websites and advertisements, these …
user details. Primarily used to evade tracking by websites and advertisements, these …
Practical keystroke timing attacks in sandboxed javascript
Keystrokes trigger interrupts which can be detected through software side channels to
reconstruct keystroke timings. Keystroke timing attacks use these side channels to infer …
reconstruct keystroke timings. Keystroke timing attacks use these side channels to infer …
[HTML][HTML] Stealing PINs via mobile sensors: actual risk versus user perception
In this paper, we present the actual risks of stealing user PINs by using mobile sensors
versus the perceived risks by users. First, we propose PINlogger. js which is a JavaScript …
versus the perceived risks by users. First, we propose PINlogger. js which is a JavaScript …
A practical deep learning-based acoustic side channel attack on keyboards
J Harrison, E Toreini… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
With recent developments in deep learning, the ubiquity of microphones and the rise in
online services via personal devices, acoustic side channel attacks present a greater threat …
online services via personal devices, acoustic side channel attacks present a greater threat …
EdgeSanitizer: Locally differentially private deep inference at the edge for mobile data analytics
Deep neural networks have been widely applied in various machine learning applications
for mobile data analytics in cloud. However, this approach introduces significant data …
for mobile data analytics in cloud. However, this approach introduces significant data …