Mobile sensing has become a new style of applications and most of the smart devices are equipped with varieties of sensors or functionalities to enhance sensing capabilities. Current sensing systems concentrate on how to enhance sensing capabilities; however, the sensors or functionalities may lead to the leakage of users’ privacy. In this paper, we present WiPass, a way to leverage the wireless hotspot functionality on the smart devices to snoop the unlock passwords/patterns without the support of additional hardware. The attacker can “see” your unlock passwords/patterns even one meter away. WiPass leverages the impacts of finger motions on the wireless signals during the unlocking period to analyze the passwords/patterns. To practically i...
Wi-Fi signals may help realize low-cost and non-invasive human sensing, yet it can also be exploited...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
In the following thesis, we propose a set of techniques that allow us to create unique signatures fo...
Thanks to the development of Internet of Things (IoT) technologies, wearable markets have been growi...
Digital password lock has been commonly used on mobile devices as the primary authentication method....
This paper describes how mobile device apps can inadvertently broadcast personal information through...
The proliferation of the mobile devices (e.g., smartphones, smartwatches and fitness trackers) has b...
The concept of Smart Home where appliances, sensors, actuators, displays and computing resources are...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
We demonstrate that the network flux over the sensor network provides us fingerprint information abo...
abstract: Mobile devices have penetrated into every aspect of modern world. For one thing, they are ...
The popularity of smart home devices is growing as consumers begin to recognize their potential to i...
Abstract As healthcare in many countries faces an aging population and rising costs, mobile sensing ...
Demand for smartwatches has taken off in recent years with new models which can run independently fr...
We demonstrate how the multitude of sensors on a smart-phone can be used to construct a reliable har...
Wi-Fi signals may help realize low-cost and non-invasive human sensing, yet it can also be exploited...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
In the following thesis, we propose a set of techniques that allow us to create unique signatures fo...
Thanks to the development of Internet of Things (IoT) technologies, wearable markets have been growi...
Digital password lock has been commonly used on mobile devices as the primary authentication method....
This paper describes how mobile device apps can inadvertently broadcast personal information through...
The proliferation of the mobile devices (e.g., smartphones, smartwatches and fitness trackers) has b...
The concept of Smart Home where appliances, sensors, actuators, displays and computing resources are...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
We demonstrate that the network flux over the sensor network provides us fingerprint information abo...
abstract: Mobile devices have penetrated into every aspect of modern world. For one thing, they are ...
The popularity of smart home devices is growing as consumers begin to recognize their potential to i...
Abstract As healthcare in many countries faces an aging population and rising costs, mobile sensing ...
Demand for smartwatches has taken off in recent years with new models which can run independently fr...
We demonstrate how the multitude of sensors on a smart-phone can be used to construct a reliable har...
Wi-Fi signals may help realize low-cost and non-invasive human sensing, yet it can also be exploited...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
In the following thesis, we propose a set of techniques that allow us to create unique signatures fo...