Touchtone leakage attacks via smartphone sensors: mitigation without hardware modification.
Connor BoltonYan LongJun HanJosiah D. HesterKevin FuPublished in: CoRR (2021)
Keyphrases
- real time
- information leakage
- low cost
- hardware and software
- low cost sensors
- micro controller
- sensor networks
- data acquisition
- central processor
- multi sensor
- sensor data
- data fusion
- mobile devices
- daily life
- mobile applications
- countermeasures
- vlsi implementation
- malicious attacks
- image sensor
- computing systems
- personal computer
- hardware architecture
- sensor fusion
- personal information
- computing platform
- computer security
- watermarking scheme
- risk management
- security threats
- traffic analysis
- anomaly detection
- denial of service attacks
- context aware
- digital images
- mobile robot
- image processing