Beware, Your Hands Reveal Your Secrets!

@inproceedings{Shukla2014BewareYH,
  title={Beware, Your Hands Reveal Your Secrets!},
  author={Diksha Shukla and Rajesh Kumar and Abdul Serwadda and Vir V. Phoha},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2014}
}
Research on attacks which exploit video-based side-channels to decode text typed on a smartphone has traditionally assumed that the adversary is able to leverage some information from the screen display (say, a reflection of the screen or a low resolution video of the content typed on the screen). This paper introduces a new breed of side-channel attack on the PIN entry process on a smartphone which entirely relies on the spatio-temporal dynamics of the hands during typing to decode the typed… CONTINUE READING
Highly Cited
This paper has 75 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 45 extracted citations

A Video-based Attack for Android Pattern Lock

ACM Trans. Priv. Secur. • 2018
View 5 Excerpts
Highly Influenced

Secure fingertip mouse for mobile devices

IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications • 2016
View 4 Excerpts
Highly Influenced

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals

ACM Conference on Computer and Communications Security • 2016
View 4 Excerpts
Highly Influenced

No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing

ACM Conference on Computer and Communications Security • 2018
View 1 Excerpt

Personal PIN Leakage from Wearable Devices

IEEE Transactions on Mobile Computing • 2018
View 1 Excerpt

76 Citations

0102030'14'15'16'17'18'19
Citations per Year
Semantic Scholar estimates that this publication has 76 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.

Seeing double: reconstructing obscured typed input from repeated compromising reflections

ACM Conference on Computer and Communications Security • 2013
View 3 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…