Wearable microphone jamming

Y Chen, H Li, SY Teng, S Nagels, Z Li… - Proceedings of the …, 2020 - dl.acm.org
We engineered a wearable microphone jammer that is capable of disabling microphones in
its user's surroundings, including hidden microphones. Our device is based on a recent …

Does this app really need my location? Context-aware privacy management for smartphones

S Chitkara, N Gothoskar, S Harish, JI Hong… - Proceedings of the …, 2017 - dl.acm.org
The enormous popularity of smartphones, their rich sensing capabilities, and the data they
have about their users have lead to millions of apps being developed and used. However …

Secloak: Arm trustzone-based mobile peripheral control

M Lentz, R Sen, P Druschel… - Proceedings of the 16th …, 2018 - dl.acm.org
Reliable on-off control of peripherals on smart devices is a key to security and privacy in
many scenarios. Journalists want to reliably turn off radios to protect their sources during …

Beyond LED status lights-design requirements of privacy notices for body-worn cameras

M Koelle, K Wolf, S Boll - … of the Twelfth International Conference on …, 2018 - dl.acm.org
Privacy notices aim to make users aware of personal data gathered and processed by a
system. Body-worn cameras currently lack suitable design strategies for privacy notices that …

Privacy preservation and security challenges: a new frontier multimodal machine learning research

S Kumar, MK Chaube, SN Nenavath… - … Journal of Sensor …, 2022 - inderscienceonline.com
Multimodal machine learning is a vibrant multi-disciplinary field and achieved much
attention due to its wide range of applications. A research problem is multimodal, for the …

Locally private frequency estimation of physical symptoms for infectious disease analysis in Internet of Medical Things

X Wu, MR Khosravi, L Qi, G Ji, W Dou, X Xu - Computer Communications, 2020 - Elsevier
Frequency estimation of physical symptoms for peoples is the most direct way to analyze
and predict infectious diseases. In Internet of medical Things (IoMT), it is efficient and …

Schrodintext: Strong protection of sensitive textual content of mobile applications

A Amiri Sani - Proceedings of the 15th annual international …, 2017 - dl.acm.org
Many mobile applications deliver and show sensitive and private textual content to users
including messages, social network posts, account information, and verification codes. All …

Hey kimya, is my smart speaker spying on me? taking control of sensor privacy through isolation and amnesia

P De Vaere, A Perrig - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Although smart speakers and other voice assistants are becoming increasingly ubiquitous,
their always-standby nature continues to prompt significant privacy concerns. To address …

Webcam covering as planned behavior

D Machuletz, S Laube, R Böhme - … of the 2018 CHI Conference on …, 2018 - dl.acm.org
Most of today's laptops come with an integrated webcam placed above the screen to enable
video conferencing. Due to the risk of webcam spying attacks, some laptop users seem to be …

Ditio: Trustworthy auditing of sensor activities in mobile & iot devices

S Mirzamohammadi, JA Chen, AA Sani… - Proceedings of the 15th …, 2017 - dl.acm.org
Mobile and Internet-of-Things (IoT) devices, such as smartphones, tablets, wearables, smart
home assistants (eg, Google Home and Amazon Echo), and wall-mounted cameras, come …