We introduce a lightweight permission enforcement approach – Tap-Wave-Rub (TWR) – for smartphone malware prevention. TWR is based on simple human gestures (implicit or explicit) that are very quick and intuitive but less likely to be exhibited in users’ daily activities. Presence or absence of such gestures, prior to accessing an application, can effectively inform the OS whether the access request is benign or malicious. In this paper, we focus on the design of an accelerometer-based phone tapping detection mechanism. This implicit tapping detection mechanism is geared to prevent malicious access to NFC services, where a user is usu-ally required to tap her phone with another device. We present a variety of novel experiments to evaluate t...
Abstract—Securing the sensitive data stored and accessed from mobile devices makes user authenticati...
ABSTRACT Modern, off-the-shelf smartphones provide a rich set of possible touchscreen interactions, ...
In this article, we present a new user authentication technique for touchscreen-based smartphone use...
Abstract—Malware is a burgeoning threat for smartphones. It can surreptitiously access sensitive ser...
We propose a new approach for authenticating users of mo-bile devices that is based on analyzing the...
As our intimate lives become more tangled with the smartphones we carry, privacy has become an incre...
As smartphones become ever more present and interwoven into the daily computing of individuals, a br...
In this paper, we present TapLock as a smartphone password system that exploits the finger tap event...
Abstract. Nowadays, Smartphones are widely used and they have a growing market share of already more...
The growth of Internet and the pervasiveness of ICT have led to a radical change in social relations...
Current smartphone authentication methods are known to be susceptible to even rudimentary attacks ba...
Mobile NFC payment is an emerging industry, estimated to reach $670 billion by 2015. The Mafia attack...
Capacitive touchscreens have become the primary human-machine interface for personal devices such as...
Malicious software (malware) is designed to circumvent the security policy of the host device. Smart...
Abstract. We study the feasibility of leveraging the sensors embedded on mo-bile devices to enable a...
Abstract—Securing the sensitive data stored and accessed from mobile devices makes user authenticati...
ABSTRACT Modern, off-the-shelf smartphones provide a rich set of possible touchscreen interactions, ...
In this article, we present a new user authentication technique for touchscreen-based smartphone use...
Abstract—Malware is a burgeoning threat for smartphones. It can surreptitiously access sensitive ser...
We propose a new approach for authenticating users of mo-bile devices that is based on analyzing the...
As our intimate lives become more tangled with the smartphones we carry, privacy has become an incre...
As smartphones become ever more present and interwoven into the daily computing of individuals, a br...
In this paper, we present TapLock as a smartphone password system that exploits the finger tap event...
Abstract. Nowadays, Smartphones are widely used and they have a growing market share of already more...
The growth of Internet and the pervasiveness of ICT have led to a radical change in social relations...
Current smartphone authentication methods are known to be susceptible to even rudimentary attacks ba...
Mobile NFC payment is an emerging industry, estimated to reach $670 billion by 2015. The Mafia attack...
Capacitive touchscreens have become the primary human-machine interface for personal devices such as...
Malicious software (malware) is designed to circumvent the security policy of the host device. Smart...
Abstract. We study the feasibility of leveraging the sensors embedded on mo-bile devices to enable a...
Abstract—Securing the sensitive data stored and accessed from mobile devices makes user authenticati...
ABSTRACT Modern, off-the-shelf smartphones provide a rich set of possible touchscreen interactions, ...
In this article, we present a new user authentication technique for touchscreen-based smartphone use...