Proceedings of the 21st Annual International Conference on Mobile Computing and Networking 2015
DOI: 10.1145/2789168.2790121
|View full text |Cite
|
Sign up to set email alerts
|

MoLe

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 188 publications
(17 citation statements)
references
References 12 publications
0
17
0
Order By: Relevance
“…One line of studies even showed a privacy risk caused by the keystroke inference attacks. These attacks are realized by analyzing users' hand movements tracked by sensors (e.g., accelerometer) built in the smartwatches, which makes it possible to accurately collect the inputs information on keyboards (Liu, Zhou, Diao, Li, & Zhang, ; Maiti, Armbruster, Jadliwala, & He, ; Maiti, Jadliwala, He, & Bilogrevic, ; Wang, Guo, Wang, Chen, & Liu, ; Wang, Lai, & Roy Choudhury, ). Unfortunately, a recent survey showed that most of the users were unaware of the new type of motion‐sensor‐based threat to their privacy (Crager & Maiti, ).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…One line of studies even showed a privacy risk caused by the keystroke inference attacks. These attacks are realized by analyzing users' hand movements tracked by sensors (e.g., accelerometer) built in the smartwatches, which makes it possible to accurately collect the inputs information on keyboards (Liu, Zhou, Diao, Li, & Zhang, ; Maiti, Armbruster, Jadliwala, & He, ; Maiti, Jadliwala, He, & Bilogrevic, ; Wang, Guo, Wang, Chen, & Liu, ; Wang, Lai, & Roy Choudhury, ). Unfortunately, a recent survey showed that most of the users were unaware of the new type of motion‐sensor‐based threat to their privacy (Crager & Maiti, ).…”
Section: Resultsmentioning
confidence: 99%
“…These attacks are realized by analyzing users' hand movements tracked by sensors (e.g., accelerometer) built in the smartwatches, which makes it possible to accurately collect the inputs information on keyboards (Liu, Zhou, Diao, Li, & Zhang, 2015;Maiti, Armbruster, Jadliwala, & He, 2016;Maiti, Jadliwala, He, & Bilogrevic, 2015;Wang, Guo, Wang, Chen, & Liu, 2016;Wang, Lai, & Roy Choudhury, 2015).…”
Section: Privacy Risksmentioning
confidence: 99%
“…As wearable devices, such as the glasses from Andrew's story, become more complex and diverse due to industry manufacturers striving to deliver more features and functionality to users at lower costs, it is unsuspecting and uninformed users of such devices, as well as bystanders, that become exposed to a wider range of potential security and privacy attacks from malicious parties [30,66,93]. But glasses are not the only wearables that can become targets of such attacks: smartwatches, fitness trackers, and armbands have been repeatedly exposed in the scientific literature as being unsecure [6,15,20,30,81,94,94]. However, unlike smartwatches and fitness trackers, for which a large body of literature has uncovered many security threats and proposed defense mechanisms, similar systematic investigations for glasses are lacking.…”
Section: :2 • Opaschi and Vatavumentioning
confidence: 99%
“…The advent of wearables that publicly advertise their presence in the radio spectrum, share the data they collect with connected devices or with services from the cloud, and register to unsecured local networks, demands dedicated attention to the privacy and security threats to which they expose their users. Some of those security threats have been recently uncovered for smartwatches [81,93,94], fitness trackers [6,15,20,30], and smart armbands [103], but considerably less attention has been devoted to examine the security of video streaming camera glasses. Regarding the latter, the main focus of research has been the privacy of bystanders and their reactions to wearers of such devices [23,25,43,[48][49][50].…”
Section: Related Workmentioning
confidence: 99%
“…Recognition accuracy in sentences. To evaluate WiMorse in real-world sentences input, we collected CSI data for six different sentences from previous literatures [38], [39]: S1 = "the quick brown fox jumps over the lazy dog", S2 = "nobody knew why the candles blew out", S3 = "the autumn leaves look like golden snow", S4 = "nothing is as profound as the imagination", S5 = "my small pet mouse escaped from his cage" and S6 = "the most profound technologies are those that disappear". Each sentence is typed 3 times without spaces.…”
Section: B Overall Performancementioning
confidence: 99%