• Publications
  • Influence
(Smart)watch your taps: side-channel keystroke inference attacks using smartwatches
In this paper, we investigate the feasibility of keystroke inference attacks on handheld numeric touchpads by using smartwatch motion sensors as a side-channel. The proposed attack approach employsExpand
  • 53
  • 4
  • PDF
Adaptive information-sharing for privacy-aware mobile social networks
Personal and contextual information are increasingly shared via mobile social networks. Users' locations, activities and their co-presence can be shared easily with online "friends", as theirExpand
  • 44
  • 4
  • PDF
Security Issues in Next Generation Mobile Networks: LTE and Femtocells
Cellular mobile networks are used by more than 4 billion users worldwide. One effective way to meet the increasing demand for data rates is to deploy femtocells, which are low-power base stationsExpand
  • 55
  • 4
  • PDF
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. TheseExpand
  • 46
  • 3
  • PDF
Privacy in Mobile Computing for Location-Sharing-Based Services
Location-Sharing-Based Services (LSBS) complement Location-Based Services by using locations from a group of users, and not just individuals, to provide some contextualized service based on theExpand
  • 52
  • 2
  • PDF
A machine-learning based approach to privacy-aware information-sharing in mobile social networks
Contextual information about users is increasingly shared on mobile social networks. Examples of such information include users' locations, events, activities, and the co-presence of others inExpand
  • 37
  • 2
  • PDF
Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms
Location check-ins contain both geographical and semantic information about the visited venues, in the form of tags (e.g., “restaurant”). Such data might reveal some personal information about usersExpand
  • 34
  • 2
  • PDF
"If You Put All The Pieces Together...": Attitudes Towards Data Combination and Sharing Across Services and Companies
Online services often rely on processing users' data, which can be either provided directly by the users or combined from other services. Although users are aware of the latter, it is unclear whetherExpand
  • 18
  • 2
  • PDF
What's the Gist? Privacy-Preserving Aggregation of User Profiles
Over the past few years, online service providers have started gathering increasing amounts of personal information to build user profiles and monetize them with advertisers and data brokers. UsersExpand
  • 24
  • 2
  • PDF
Secure and private proofs for location-based activity summaries in urban areas
Activity-based social networks, where people upload and share information about their location-based activities (e.g., the routes of their activities), are increasingly popular. Such systems,Expand
  • 16
  • 2
  • PDF