2017
DOI: 10.1016/j.pmcj.2016.08.018
|View full text |Cite
|
Sign up to set email alerts
|

Identifying TV Channels & On-Demand Videos using Ambient Light Sensors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Video Side-Channel [81], [82] Software-based solutions may help mitigate several video-based side-channel attacks [83]- [87]. Sensory Side-Channel Attacks [88]- [96] Solutions to sensory attacks include dedicated machine-learning frameworks [18], [97], [98]. Battery Exhaustion Battery Exhaustion Attacks [99]- [102] IDS frameworks such as MVP-IDS and B-SIPS [101], [103].…”
Section: E-iot Devices Layer: Attacks and Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Video Side-Channel [81], [82] Software-based solutions may help mitigate several video-based side-channel attacks [83]- [87]. Sensory Side-Channel Attacks [88]- [96] Solutions to sensory attacks include dedicated machine-learning frameworks [18], [97], [98]. Battery Exhaustion Battery Exhaustion Attacks [99]- [102] IDS frameworks such as MVP-IDS and B-SIPS [101], [103].…”
Section: E-iot Devices Layer: Attacks and Vulnerabilitiesmentioning
confidence: 99%
“…For instance, Xu et al created a video recognition attack where they were able to identify a video being watched on a television using the light emitted by the television through a window [82]. Similar works as presented by Schwittmann et al used ambient light sensors on smartphones and smartwatches to perform similar attacks [88], [89]. Alternatively, Light Ears, presented by Maiti et al, proposed a new attack vector designed to infer a user's private data and preferences from smart lighting media visualization features [90].…”
Section: E-iot Devices Layer: Attacks and Vulnerabilitiesmentioning
confidence: 99%
“…Similarly, Schwittmann et al [36] were able to infer a video played on a TV, by exploiting a smartphone's ambient light sensor. An extended work by Schwittmann et al [35] employed the ambient light sensor on a smartwatch to accomplish the same attack. Alternatively, Backes et al [12], [13] demonstrated how reflections from objects such as, users' eyes, teapots and walls can be exploited for spying on printed or digitally displayed data.…”
Section: Related Workmentioning
confidence: 99%
“…With the advancements in optoelectronic information technology, microelectronics technology, and communication technology, ambient light sensors, as key devices for photoelectric detection technology, are widely used in consumer electronics, automotive electronics, and industrial control. More and more electronic products have entered and changed our daily lives, such as multimedia music players, smartphones, digital cameras, tablet PCs, and car navigation systems [ 1 , 2 , 3 , 4 , 5 ], all of which use ambient light sensors to convert light illumination into electrical signals to prolong battery life and backlight life, as well as improve power efficiency. These portable electronic devices have become an indispensable part of our lives and work, making our lives more convenient and our quality of life higher.…”
Section: Introductionmentioning
confidence: 99%