Multi-sensor context-awareness in mobile devices and smart artifacts
Mobile Networks and Applications
A Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research
Keyboard acoustic emanations revisited
Proceedings of the 12th ACM conference on Computer and communications security
A Survey of Location Privacy and an Approach for Solitary Users
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
IEEE Security and Privacy
A trusted mobile phone reference architecturevia secure kernel
Proceedings of the 2007 ACM workshop on Scalable trusted computing
A flexible security architecture to support third-party applications on mobile devices
Proceedings of the 2007 ACM workshop on Computer security architecture
BeepBeep: a high accuracy acoustic ranging system using COTS mobile devices
Proceedings of the 5th international conference on Embedded networked sensor systems
User-Controllable Security and Privacy for Pervasive Computing
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Stealthy video capturer: a new video-based spyware in 3G smartphones
Proceedings of the second ACM conference on Wireless network security
Language-based information-flow security
IEEE Journal on Selected Areas in Communications
Towards permission-based attestation for the Android platform
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
TouchLogger: inferring keystrokes on touch screen from smartphone motion
HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers
Proceedings of the 18th ACM conference on Computer and communications security
ACCessory: password inference using accelerometers on smartphones
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Tapprints: your finger taps have fingerprints
Proceedings of the 10th international conference on Mobile systems, applications, and services
On the practicality of motion based keystroke inference attack
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Practicality of accelerometer side channels on smartphones
Proceedings of the 28th Annual Computer Security Applications Conference
Hi-index | 0.00 |
Modern mobile phones possess three types of capabilities: computing, communication, and sensing. While these capabilities enable a variety of novel applications, they also raise serious privacy concerns. We explore the vulnerability where attackers snoop on users by sniffing on their mobile phone sensors, such as the microphone, camera, and GPS receiver. We show that current mobile phone platforms inadequately protect their users from this threat. To provide better privacy for mobile phone users, we analyze desirable uses of these sensors and discuss the properties of good privacy protection solutions. Then, we propose a general framework for such solutions and discuss various possible approaches to implement the framework's components.