The android platform security model

R Mayrhofer, JV Stoep, C Brubaker… - ACM Transactions on …, 2021 - dl.acm.org
Android is the most widely deployed end-user focused operating system. With its growing
set of use cases encompassing communication, navigation, media consumption …

Phishing with malicious QR codes

F Sharevski, A Devine, E Pieroni, P Jachim - Proceedings of the 2022 …, 2022 - dl.acm.org
The use of QR codes for malicious purposes was rather limited in the pre-COVID-19 world.
That changed overnight, as the QR codes became a convenient go-between for sharing …

LIPAuth: Hand-dependent Light Intensity Patterns for Resilient User Authentication

H Cao, D Liu, H Jiang, R Wang, Z Chen… - ACM Transactions on …, 2023 - dl.acm.org
Authentication mechanisms deployed on access control systems undertake the
responsibility of judging user identity to prevent unauthorized individuals from illegally …

PresSafe: Barometer-based on-screen pressure-assisted implicit authentication for smartphones

M Yao, D Tao, R Gao, J Wang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Graphic-pattern-based implicit authentication has been successfully exploited to elevate the
security of smartphones. On-screen pressure is one of the key features in such an approach …

Reversing and fuzzing the google titan m chip

D Melotti, M Rossi-Bellom, A Continella - Reversing and Offensive …, 2021 - dl.acm.org
Google recently introduced a secure chip called Titan M in its Pixel smartphones, enabling
the implementation of a Trusted Execution Environment (TEE) in Tamper Resistant …

Gone quishing: A field study of phishing with malicious qr codes

F Sharevski, A Devine, E Pieroni, P Jachim - arXiv preprint arXiv …, 2022 - arxiv.org
The COVID-19 pandemic enabled" quishing", or phishing with malicious QR codes, as they
became a convenient go-between for sharing URLs, including malicious ones. To explore …

Gantouch: An attack-resilient framework for touch-based continuous authentication system

M Agrawal, P Mehrotra, R Kumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Previous studies have shown that commonly studied (vanilla) implementations of touch-
based continuous authentication systems (V-TCAS) are susceptible to active adversarial …

A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones

H Farzand, M Abraham, S Brewster… - … Journal of Human …, 2024 - Taylor & Francis
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …

Deeper insight into why authentication schemes in IoT environments fail to achieve the desired security

Y Guo, Y Guo, P Xiong, F Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Designing an efficient and secure authentication scheme is a significant means to ensure
the security of IoT systems. Hundreds of authentication schemes tailored for IoT …

SonarAuth: Using Around Device Sensing to Improve Smartwatch Behavioral Biometrics

J Kim, J Park, I Oakley - Adjunct Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Smartwatches are used by millions of people for applications in health, finance, and
communication. As the computational power and range of applications supported by these …