Channel state information (CSI) has been recently shown to be useful in performing security attacks in public WiFi environments. By analyzing how CSI is affected by finger motions, CSI-based attacks can effectively reconstruct text-based passwords and locking patterns. This paper presents WiGuard, a novel system to protect sensitive on-screen input information in a public place. Our approach carefully exploits WiFi channel interference to introduce noise to attacker’s CSI measurements to reduce the success rate of CSI-based attacks. Our approach automatically detects when a CSI-based attack happens. We evaluate our approach by applying it to protect text-based passwords and pattern locks on mobile devices. Experimental results show that our...
Passive, device-free localization of a person exploiting the Channel State Information (CSI) from Wi...
With the development of the Internet-of-Things (IoT), wireless network security has more and more at...
Mobile sensing has become a new style of applications and most of the smart devices are equipped wit...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
Recently, channel state information (CSI) is shown to be an effective side-channel to perform attack...
Data exfiltration methods aim to extract data without authorization from a network or device without...
User authentication is the critical first step to detect identity-based attacks and prevent subseque...
Abstract—Comparing to well protected data frames, Wi-Fi management frames (MFs) are extremely vulner...
Each 802.11n WiFi frame contains a preamble which allows a receiver to estimate the impact of the wi...
The paper presents a novel Wi-Fi fingerprinting system CSI-MIMO that uses a finegrained information ...
Channel State Information (CSI) based localization with 802.11 has been proven feasible in multiple ...
User authentication is the critical first step in detecting identity-based attacks and preventing su...
With the development of the Internet-of-Things (IoT), wireless network security has more and more at...
Passive, device-free localization of a person exploiting the Channel State Information (CSI) from Wi...
With the development of the Internet-of-Things (IoT), wireless network security has more and more at...
Mobile sensing has become a new style of applications and most of the smart devices are equipped wit...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
Recently, channel state information (CSI) is shown to be an effective side-channel to perform attack...
Data exfiltration methods aim to extract data without authorization from a network or device without...
User authentication is the critical first step to detect identity-based attacks and prevent subseque...
Abstract—Comparing to well protected data frames, Wi-Fi management frames (MFs) are extremely vulner...
Each 802.11n WiFi frame contains a preamble which allows a receiver to estimate the impact of the wi...
The paper presents a novel Wi-Fi fingerprinting system CSI-MIMO that uses a finegrained information ...
Channel State Information (CSI) based localization with 802.11 has been proven feasible in multiple ...
User authentication is the critical first step in detecting identity-based attacks and preventing su...
With the development of the Internet-of-Things (IoT), wireless network security has more and more at...
Passive, device-free localization of a person exploiting the Channel State Information (CSI) from Wi...
With the development of the Internet-of-Things (IoT), wireless network security has more and more at...
Mobile sensing has become a new style of applications and most of the smart devices are equipped wit...