作者
Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Čapkun
发表日期
2017/7/18
图书
Proceedings of the 10th acm conference on security and privacy in wireless and mobile networks
页码范围
12-22
简介
We show that the new hover (floating touch) technology, available in a number of today's smartphone models, can be abused by malicious Android applications to record all touchscreen input into applications system-wide. Leveraging this attack, a malicious application running on the system is able to capture sensitive input such as passwords and PINs, record all user's social interactions, as well as profile user's behavior. To evaluate our attack we implemented Hoover, a proof-of-concept malicious application that runs in the background and records all input to all foreground applications. We evaluated Hoover with 20 users, across two different Android devices and two input methods, stylus and finger. In the case of touchscreen input by finger, Hoover estimated the positions of users' clicks within an error of 100 pixels and keyboard input with an accuracy of 79%. Hoover captured users' input by stylus even more …
引用总数
2019202020212022202320242121
学术搜索中的文章
E Ulqinaku, L Malisa, J Stefa, A Mei, S Čapkun - Proceedings of the 10th acm conference on security …, 2017