A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

A survey on sensor-based threats to internet-of-things (iot) devices and applications

AK Sikder, G Petracca, H Aksu, T Jaeger… - arXiv preprint arXiv …, 2018 - arxiv.org
The concept of Internet of Things (IoT) has become more popular in the modern era of
technology than ever before. From small household devices to large industrial machines, the …

{6thSense}: A context-aware sensor-based attack detector for smart devices

AK Sikder, H Aksu, AS Uluagac - 26th USENIX Security Symposium …, 2017 - usenix.org
Sensors (eg, light, gyroscope, accelerometer) and sensing enabled applications on a smart
device make the applications more user-friendly and efficient. However, the current …

A context-aware framework for detecting sensor-based threats on smart devices

AK Sikder, H Aksu, AS Uluagac - IEEE Transactions on Mobile …, 2019 - ieeexplore.ieee.org
Sensors (eg, light, gyroscope, and accelerometer) and sensing-enabled applications on a
smart device make the applications more user-friendly and efficient. However, the current …

Semadroid: A privacy-aware sensor management framework for smartphones

Z Xu, S Zhu - Proceedings of the 5th ACM Conference on Data and …, 2015 - dl.acm.org
While mobile sensing applications are booming, the sensor management mechanisms in
current smartphone operating systems are left behind--they are incomprehensive and …

Smashed: Sniffing and manipulating android sensor data for offensive purposes

M Mohamed, B Shrestha… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The current Android sensor security model either allows only restrictive read access to
sensitive sensors (eg, an app can only read its own touch data) or requires special install …

Aegis: A context-aware security framework for smart home systems

AK Sikder, L Babun, H Aksu, AS Uluagac - Proceedings of the 35th …, 2019 - dl.acm.org
Our everyday lives are expanding fast with the introduction of new Smart Home Systems
(SHSs). Today, a myriad of SHS devices and applications are widely available to users and …

A survey on cyber-physical systems security

Z Yu, H Gao, X Cong, N Wu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Cyber–physical systems (CPSs) are new types of intelligent systems that integrate
computing, control, and communication technologies, bridging the cyberspace and physical …

Mobile application security: malware threats and defenses

D He, S Chan, M Guizani - IEEE Wireless Communications, 2015 - ieeexplore.ieee.org
Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to
smartphones is tremendous. One of the most attractive features of smartphones is the …

Your voice assistant is mine: How to abuse speakers to steal information and control your phone

W Diao, X Liu, Z Zhou, K Zhang - Proceedings of the 4th ACM Workshop …, 2014 - dl.acm.org
Previous research about sensor based attacks on Android platform focused mainly on
accessing or controlling over sensitive components, such as camera, microphone and GPS …