ECCV'10 Proceedings of the 11th European conference on Computer vision: Part VI
Acoustic side-channel attacks on printers
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Display-camera calibration using eye reflections and geometry constraints
Computer Vision and Image Understanding
iSpy: automatic reconstruction of typed input from compromising reflections
Proceedings of the 18th ACM conference on Computer and communications security
(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers
Proceedings of the 18th ACM conference on Computer and communications security
Point of gaze estimation through corneal surface reflection in an active illumination environment
ECCV'12 Proceedings of the 12th European conference on Computer Vision - Volume Part II
Seeing double: reconstructing obscured typed input from repeated compromising reflections
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Security and privacy for augmented reality systems
Communications of the ACM
Hi-index | 0.02 |
Reflecting objects such as tea pots and glasses, but also diffusely reflecting objects such as a user's shirt, can be used to spy on confidential data displayed on a monitor. First, we show how reflections in the user's eye can be exploited for spying on confidential data. Second, we investigate to what extent monitor images can be reconstructed from the diffuse reflections on a wall or the user's clothes, and provide information-theoretic bounds limiting this type of attack. Third, we evaluate the effectiveness of several countermeasures. This substantially improves previous work (Backes et al., IEEE Symposium on Security & Privacy, 2008).