A survey on security for mobile devices

M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

Accessory: password inference using accelerometers on smartphones

E Owusu, J Han, S Das, A Perrig, J Zhang - proceedings of the twelfth …, 2012 - dl.acm.org
We show that accelerometer readings are a powerful side channel that can be used to
extract entire sequences of entered text on a smart-phone touchscreen keyboard. This …

[PDF][PDF] {TouchLogger}: Inferring Keystrokes on Touch Screen from Smartphone Motion

L Cai, H Chen - 6th USENIX Workshop on Hot Topics in Security …, 2011 - usenix.org
Attacks that use side channels, such as sound and electromagnetic emanation, to infer
keystrokes on physical keyboards are ineffective on smartphones without physical …

Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors

Z Xu, K Bai, S Zhu - Proceedings of the fifth ACM conference on Security …, 2012 - dl.acm.org
Today's smartphones are shipped with various embedded motion sensors, such as the
accelerometer, gyroscope, and orientation sensors. These motion sensors are useful in …

[PDF][PDF] Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.

R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia… - NDSS, 2011 - informatics.indiana.edu
We explore the threat of smartphone malware with access to on-board sensors, which opens
new avenues for illicit collection of private information. While existing work shows that such …

Alphalogger: Detecting motion-based side-channel attack using smartphone keystrokes

AR Javed, MO Beg, M Asim, T Baker… - Journal of Ambient …, 2023 - Springer
Due to the advancement in technologies and excessive usability of smartphones in various
domains (eg, mobile banking), smartphones became more prone to malicious attacks …

Practicality of accelerometer side channels on smartphones

AJ Aviv, B Sapp, M Blaze, JM Smith - Proceedings of the 28th annual …, 2012 - dl.acm.org
Modern smartphones are equipped with a plethora of sensors that enable a wide range of
interactions, but some of these sensors can be employed as a side channel to surreptitiously …

Smartphone malware and its propagation modeling: A survey

S Peng, S Yu, A Yang - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
Smartphones are pervasively used in society, and have been both the target and victim of
malware writers. Motivated by the significant threat that presents to legitimate users, we …

An incentive framework for cellular traffic offloading

X Zhuo, W Gao, G Cao, S Hua - IEEE transactions on mobile …, 2013 - ieeexplore.ieee.org
Cellular networks (eg, 3G) are currently facing severe traffic overload problems caused by
excessive traffic demands. Offloading part of the cellular traffic through other forms of …