A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

Machine learning–based cyber attacks targeting on controlled information: A survey

Y Miao, C Chen, L Pan, QL Han, J Zhang… - ACM Computing Surveys …, 2021 - dl.acm.org
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …

RSA key extraction via low-bandwidth acoustic cryptanalysis

D Genkin, A Shamir, E Tromer - … , Santa Barbara, CA, USA, August 17-21 …, 2014 - Springer
Many computers emit a high-pitched noise during operation, due to vibration in some of their
electronic components. These acoustic emanations are more than a nuisance: as we show …

Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

An indirect eavesdropping attack of keystrokes on touch screen through acoustic sensing

J Yu, L Lu, Y Chen, Y Zhu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper demonstrates the feasibility of a side-channel attack to infer keystrokes on touch
screen leveraging an off-the-shelf smartphone. Although there exist some studies on …

When good becomes evil: Keystroke inference with smartwatch

X Liu, Z Zhou, W Diao, Z Li, K Zhang - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
One rising trend in today's consumer electronics is the wearable devices, eg, smartwatches.
With tens of millions of smartwatches shipped, however, the security implications of such …

Reducing shoulder-surfing by using gaze-based password entry

M Kumar, T Garfinkel, D Boneh… - Proceedings of the 3rd …, 2007 - dl.acm.org
Shoulder-surfing--using direct observation techniques, such as looking over someone's
shoulder, to get passwords, PINs and other sensitive personal information--is a problem that …

[PDF][PDF] Compromising electromagnetic emanations of wired and wireless keyboards.

M Vuagnoux, S Pasini - USENIX security symposium, 2009 - usenix.org
Computer keyboards are often used to transmit confidential data such as passwords. Since
they contain electronic components, keyboards eventually emit electromagnetic waves …

Sensors of smart devices in the internet of everything (IoE) era: big opportunities and massive doubts

M Masoud, Y Jaradat, A Manasrah… - Journal of …, 2019 - Wiley Online Library
Smart device industry allows developers and designers to embed different sensors,
processors, and memories in small‐size electronic devices. Sensors are added to enhance …

Snooping keystrokes with mm-level audio ranging on a single phone

J Liu, Y Wang, G Kar, Y Chen, J Yang… - Proceedings of the 21st …, 2015 - dl.acm.org
This paper explores the limits of audio ranging on mobile devices in the context of a
keystroke snooping scenario. Acoustic keystroke snooping is challenging because it …