Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds 2009
DOI: 10.1145/1592606.1592614
|View full text |Cite
|
Sign up to set email alerts
|

Defending against sensor-sniffing attacks on mobile phones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
50
0
2

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(52 citation statements)
references
References 12 publications
0
50
0
2
Order By: Relevance
“…The security and effectiveness of such techniques have been studied in previous works [26], [17], [3], [12], [22], [10]. Cai et al [6] discussed properties of a privacy protecing sensors. Although these mechanisms have proved to be effective against a large number of attacks, they are not effective against side channel attacks that bypass them.…”
Section: Mitigationmentioning
confidence: 99%
“…The security and effectiveness of such techniques have been studied in previous works [26], [17], [3], [12], [22], [10]. Cai et al [6] discussed properties of a privacy protecing sensors. Although these mechanisms have proved to be effective against a large number of attacks, they are not effective against side channel attacks that bypass them.…”
Section: Mitigationmentioning
confidence: 99%
“…Cai et al [33] explores the vulnerability of attackers sniffing sensors on smartphones. TaintDroid [34] modifies the Android system and framework to establish system-wide dynamic taint tracking and analysis for sensitive data including data from sensors.…”
Section: Related Workmentioning
confidence: 99%
“…Sniffing attacks have been talked about in [3]. They explore the vulnerability where attackers snoop on users by sniffing on their mobile phone sensors, such as the microphone, camera, and GPS receiver.…”
Section: Related Workmentioning
confidence: 99%
“…It is also assumed that the attacker has no physical access to the device but can receive the sensor date through voice or data channels. More details about this can be found in the paper by L Cai [3]. A number of viruses have been created to exploit the vulnerabilities that exist on today's mobile devices.…”
Section: Possible Privacy Related Attacksmentioning
confidence: 99%