A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

Watermarking-based protection strategy against stealthy integrity attack on distributed state estimation

J Zhou, W Yang, W Ding, WX Zheng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This article studies the security of distributed state estimation under data integrity attacks.
Each sensor is equipped with a Kullback–Leibler (K–L) divergence detector to diagnose the …

Personalized location privacy with road network-indistinguishability

B Ma, X Wang, W Ni, RP Liu - IEEE Transactions on Intelligent …, 2022 - ieeexplore.ieee.org
The proliferation of location-based services (LBS) leads to increasing concern about
location privacy. Location obfuscation is a promising privacy-preserving technique but yet to …

New cloaking region obfuscation for road network-indistinguishability and location privacy

B Ma, X Lin, X Wang, B Liu, Y He, W Ni… - Proceedings of the 25th …, 2022 - dl.acm.org
The development of location-based services (LBS) leads to the rapid growth of location data,
potentially increasing the threat to location privacy. Existing location obfuscation techniques …

Privacy-Preserving State Estimation in the Presence of Eavesdroppers: A Survey

X Yan, G Zhou, DE Quevedo, C Murguia… - arXiv preprint arXiv …, 2024 - arxiv.org
Networked systems are increasingly the target of cyberattacks that exploit vulnerabilities
within digital communications, embedded hardware, and software. Arguably, the simplest …

An Escalated Eavesdropping Attack on Mobile Devices via Low-Resolution Vibration Signals

Y Liang, Y Qin, Q Li, X Yan, L Huangfu… - … on Dependable and …, 2022 - ieeexplore.ieee.org
With the global prevalence of mobile devices, concerns about mobile devices regarding
privacy breaches and data leakage are rising. Although sensor permissions are required for …

A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones

H Farzand, M Abraham, S Brewster… - … Journal of Human …, 2024 - Taylor & Francis
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …

RFTrack: Stealthy Location Inference and Tracking Attack on Wi-Fi Devices

R Li, H Hu, Q Ye - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
We present RFTrack, a new indoor location inference attack on Wi-Fi devices. This attack
differs from existing Wi-Fi localization methods as it does not need bulky appliance …

Earspy: Spying caller speech and identity through tiny vibrations of smartphone ear speakers

AT Mahdad, C Shi, Z Ye, T Zhao, Y Wang… - arXiv preprint arXiv …, 2022 - arxiv.org
Eavesdropping from the user's smartphone is a well-known threat to the user's safety and
privacy. Existing studies show that loudspeaker reverberation can inject speech into motion …

EmoLeak: Smartphone Motions Reveal Emotions

AT Mahdad, C Shi, Z Ye, T Zhao… - 2023 IEEE 43rd …, 2023 - ieeexplore.ieee.org
Emotional state leakage attracts increasing concerns as it reveals rich sensitive information,
such as intent, demo graphic, personality, and health information. Existing emotion …