2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2018
DOI: 10.1109/isvlsi.2018.00073
|View full text |Cite
|
Sign up to set email alerts
|

Guessing Your PIN Right: Unlocking Smartphones with Publicly Available Sensor Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…By using the inertial sensors in a smartwatch, an attacker can track the victim's hand motion, and recognize the content that the victim inputs via keyboards [45] and keypads [31], or guess the password of a turntable password lock [30]. By using the data from a cellphone's permissionless sensors such as accelerometer and gyroscope, the attacker can reconstruct the victim's secret PIN for unlocking the cellphone [9].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…By using the inertial sensors in a smartwatch, an attacker can track the victim's hand motion, and recognize the content that the victim inputs via keyboards [45] and keypads [31], or guess the password of a turntable password lock [30]. By using the data from a cellphone's permissionless sensors such as accelerometer and gyroscope, the attacker can reconstruct the victim's secret PIN for unlocking the cellphone [9].…”
Section: Related Workmentioning
confidence: 99%
“…If the difference is larger than a constant threshold d T 2 = 10 m, we consider that the two edges do not match and continue to try the next start point. If the two edges match, we traverse the following edges of the new path and find if the similar edges exist in the base graph (line [8][9][10][11][12][13][14][15][16][17][18][19][20][21][22].…”
Section: Algorithm 4: Merge the Base Graph And A New Pathmentioning
confidence: 99%