Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence …

AA Al-Kadhimi, MM Singh, MNA Khalid - Applied Sciences, 2023 - mdpi.com
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-
organized and skilled adversary to remain undetected while systematically and continuously …

Replacement autoencoder: A privacy-preserving algorithm for sensory data analysis

M Malekzadeh, RG Clegg, H Haddadi - arXiv preprint arXiv:1710.06564, 2017 - arxiv.org
An increasing number of sensors on mobile, Internet of things (IoT), and wearable devices
generate time-series measurements of physical activities. Though access to the sensory …

Understanding human-chosen pins: characteristics, distribution and security

D Wang, Q Gu, X Huang, P Wang - Proceedings of the 2017 ACM on …, 2017 - dl.acm.org
Personal Identification Numbers (PINs) are ubiquitously used in embedded computing
systems where user input interfaces are constrained. Yet, little attention has been paid to this …

Javascript zero: Real javascript and zero side-channel attacks

M Schwarz, M Lipp, D Gruss - Network and Distributed …, 2018 - graz.elsevierpure.com
Modern web browsers are ubiquitously used by billions of users, connecting them to the
world wide web. From the other side, web browsers do not only provide a unified interface …

[PDF][PDF] JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits.

M Schwarz, F Lackner, D Gruss - NDSS, 2019 - attacking.systems
Today, more and more web browsers and extensions provide anonymity features to hide
user details. Primarily used to evade tracking by websites and advertisements, these …

Practical keystroke timing attacks in sandboxed javascript

M Lipp, D Gruss, M Schwarz, D Bidner… - … –ESORICS 2017: 22nd …, 2017 - Springer
Keystrokes trigger interrupts which can be detected through software side channels to
reconstruct keystroke timings. Keystroke timing attacks use these side channels to infer …

[HTML][HTML] Stealing PINs via mobile sensors: actual risk versus user perception

M Mehrnezhad, E Toreini, SF Shahandashti… - International Journal of …, 2018 - Springer
In this paper, we present the actual risks of stealing user PINs by using mobile sensors
versus the perceived risks by users. First, we propose PINlogger. js which is a JavaScript …

A practical deep learning-based acoustic side channel attack on keyboards

J Harrison, E Toreini… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
With recent developments in deep learning, the ubiquity of microphones and the rise in
online services via personal devices, acoustic side channel attacks present a greater threat …

EdgeSanitizer: Locally differentially private deep inference at the edge for mobile data analytics

C Xu, J Ren, L She, Y Zhang, Z Qin… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Deep neural networks have been widely applied in various machine learning applications
for mobile data analytics in cloud. However, this approach introduces significant data …