Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …

Gyrophone: Recognizing speech from gyroscope signals

Y Michalevsky, D Boneh, G Nakibly - 23rd USENIX Security Symposium …, 2014 - usenix.org
We show that the MEMS gyroscopes found on modern smart phones are sufficiently
sensitive to measure acoustic signals in the vicinity of the phone. The resulting signals …

Are we aware? an empirical study on the privacy and security awareness of smartphone sensors

AI Champa, MF Rabbi, FZ Eishita… - 2023 IEEE/ACIS 21st …, 2023 - ieeexplore.ieee.org
Smartphones are equipped with a wide variety of sensors, which can pose significant
security and privacy risks if not properly protected. To assess the privacy and security risks of …

Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers

SA Anand, C Wang, J Liu, N Saxena… - Proceedings of the 14th …, 2021 - dl.acm.org
In this paper, we build a speech privacy attack that exploits speech reverberations from a
smartphone's inbuilt loudspeaker captured via a zero-permission motion sensor …

[HTML][HTML] Stealing PINs via mobile sensors: actual risk versus user perception

M Mehrnezhad, E Toreini, SF Shahandashti… - International Journal of …, 2018 - Springer
In this paper, we present the actual risks of stealing user PINs by using mobile sensors
versus the perceived risks by users. First, we propose PINlogger. js which is a JavaScript …

Hearing your touch: A new acoustic side channel on smartphones

I Shumailov, L Simon, J Yan, R Anderson - arXiv preprint arXiv …, 2019 - arxiv.org
We present the first acoustic side-channel attack that recovers what users type on the virtual
keyboard of their touch-screen smartphone or tablet. When a user taps the screen with a …

Identifying major research areas and minor research themes of android malware analysis and detection field using LSA

D Thakur, J Singh, G Dhiman, M Shabaz, T Gera - Complexity, 2021 - Wiley Online Library
Contemporary technologies have ensured the availability of high‐quality research data
shared over the Internet. This has resulted in a tremendous availability of research literature …

Gesture-Based Interactions: Integrating Accelerometer and Gyroscope Sensors in the Use of Mobile Apps

S Caro-Alvaro, E Garcia-Lopez, A Brun-Guajardo… - Sensors, 2024 - mdpi.com
This study investigates the feasibility and functionality of accelerometer and gyroscope
sensors for gesture-based interactions in mobile app user experience. The core of this …

[PDF][PDF] Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers

SA Anand, C Wang, J Liu, N Saxena… - arXiv preprint arXiv …, 2019 - mosis.eecs.utk.edu
In this paper, we build a speech privacy attack that exploits speech reverberations
generated from a smartphone's inbuilt loudspeaker 1 captured via a zero-permission motion …

Deep-spying: Spying using smartwatch and deep learning

T Beltramelli, S Risi - arXiv preprint arXiv:1512.05616, 2015 - arxiv.org
Wearable technologies are today on the rise, becoming more common and broadly
available to mainstream users. In fact, wristband and armband devices such as …