StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors.
Ke SunChunyu XiaSonglin XuXinyu ZhangPublished in: NDSS (2023)
Keyphrases
- private information
- third party
- access control
- personal information
- sensitive information
- privacy preserving
- role based access control
- preserving privacy
- sensitive data
- privacy protection
- private data
- sensor networks
- confidential data
- privacy preservation
- privacy policies
- security policies
- privacy concerns
- data protection
- individual privacy
- personal data
- confidential information
- privacy requirements
- fine grained
- mobile devices
- privacy violations