Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
Automated Detection of Cryptographic Inconsistencies in Android’s Keymaster Implementations
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 385–397https://doi.org/10.1145/3643832.3661893Android smartphones use a dedicated component, Keymaster, to perform all their cryptographic, security-sensitive operations (e.g., storing cryptographic material and performing signing operations). While all Android Keymaster implementations need to ...
- research-articleJune 2024
RFSpy: Eavesdropping on Online Conversations with Out-of-Vocabulary Words by Sensing Metal Coil Vibration of Headsets Leveraging RFID
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 169–182https://doi.org/10.1145/3643832.3661887Eavesdropping on human sound is one of the most common but harmful ways to threaten personal privacy. As one of the most essential accessories, headsets have been widely used in common online conversations, such as online calls, video meetings, etc. The ...
Why E.T. Can’t Phone Home: A Global View on IP-based Geoblocking at VoWiFi
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 183–195https://doi.org/10.1145/3643832.3661883In current cellular network generations (4G, 5G) the IMS (IP Multimedia Subsystem) plays an integral role in terminating voice calls and short messages. Many operators use VoWiFi (Voice over Wi-Fi, also Wi-Fi calling) as an alternative network access ...
- research-articleJune 2024
FreeEM: Uncovering Parallel Memory EMR Covert Communication in Volatile Environments
- Sihan Yu,
- Jingjing Fu,
- Chenxu Jiang,
- Chunchih Lin,
- Zhenkai Zhang,
- Long Cheng,
- Ming Li,
- Xiaonan Zhang,
- Linke Guo
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 372–384https://doi.org/10.1145/3643832.3661870Memory Electromagnetic Radiation (EMR) allows attackers to manipulate the DRAM of infiltrated systems to leak sensitive secret information. Although most of the existing works have demonstrated its feasibility, practical concerns, such as the ideal ...
- research-articleJune 2024
RefreshChannels: Exploiting Dynamic Refresh Rate Switching for Mobile Device Attacks
- Gaofeng Dong,
- Jason Wu,
- Julian De Gortari Briseno,
- Akash Deep Singh,
- Justin Feng,
- Ankur Sarker,
- Nader Sehatbakhsh,
- Mani Srivastava
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 359–371https://doi.org/10.1145/3643832.3661864Mobile devices with dynamic refresh rate (DRR) switching displays have recently become increasingly common. For power optimization, these devices switch to lower refresh rates when idling, and switch to higher refresh rates when the content displayed ...
- research-articleJune 2024
Face Recognition In Harsh Conditions: An Acoustic Based Approach
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 1–14https://doi.org/10.1145/3643832.3661855The accuracy of vision-based face recognition suffers in challenging scenarios, such as foggy or smoky weather, poor lighting, and blockage by objects like facial masks. This paper proposes an acoustic-based facial recognition system based on acoustic ...
- research-articleJune 2024
Invisible Optical Adversarial Stripes on Traffic Sign against Autonomous Vehicles
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 534–546https://doi.org/10.1145/3643832.3661854Camera-based computer vision is essential to autonomous vehicle's perception. This paper presents an attack that uses light-emitting diodes and exploits the camera's rolling shutter effect to create adversarial stripes in the captured images to mislead ...
- demonstrationJune 2024
Demo : Privacy-Preserving Decentralized Machine Learning Framework for Clustered Resource-Constrained Devices
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 612–613https://doi.org/10.1145/3643832.3661843We present a secure decentralized learning framework suitable for resource-constrained devices within a cluster environment. Our approach focuses on enhancing privacy preservation during model aggregation by utilizing Differential Privacy. This technique ...
- short-paperJune 2024
Poster: Exploiting Keystroke Dynamics via mmWave Radar for Application Profiling
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 730–731https://doi.org/10.1145/3643832.3661443Even seemingly innocuous computer usage information often leads to targeted privacy attacks. In this poster, we present mmProfiler, a novel privacy attack that aims to remotely infer user's running application. mmProfiler leverages mmWave radar-based ...
- short-paperJune 2024
Poster: Privacy in Distributed Mobile Networks
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 720–721https://doi.org/10.1145/3643832.3661438In order to achieve zero-knowledge proof (ZKP) in distributed mobile scenarios, we propose a two-stage multi-prover ZKP framework. Our method utilizes secure multi-party computation (MPC), which has advantages such as flexible adaptation, stable ...
- short-paperJune 2024
Poster: Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 710–711https://doi.org/10.1145/3643832.3661434As the foremost protocol for low-power communication, Bluetooth Low Energy (BLE) significantly impacts various aspects of our lives, including industry and healthcare. Given BLE's inherent security limitations and firmware vulnerabilities, spoofing ...
- short-paperJune 2024
Poster: StreamGuard: Enabling Secure and Uncensored Video Calls on Mobile Devices
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 678–679https://doi.org/10.1145/3643832.3661418With the increasing use of application-based video calls, the security and privacy of video and audio data have become a major concern. Despite the use of encryption, applications that implement the encryption can still access the content of video calls ...
- short-paperJune 2024
Poster: Symmetrical Pruning for Lightweight Network Anomaly Detector
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 634–635https://doi.org/10.1145/3643832.3661395In this paper, we present a novel approach of symmetrical pruning for lightweight anomaly detectors based on an autoencoder, leveraging the unique encoder-decoder structure of the autoencoder. We develop an efficient network anomaly detector with reduced ...
- short-paperJune 2024
Sensor Security in Virtual Reality: Exploration and Mitigation
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 758–759https://doi.org/10.1145/3643832.3661389Virtual Reality (VR) technology, extensively utilized in gaming, social networking, and online collaboration, has raised significant security concerns due to the array of sensors integrated into VR headsets. This paper discusses several of our ongoing ...
- short-paperJune 2024
Your Mic Leaks Too Much: A Double-Edged Sword for Security
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 754–755https://doi.org/10.1145/3643832.3661387Microphones are an integral part of a wide range of devices owing to their utility in communication and voice-controlled assistance. However, the downside to microphones' ubiquity is the increase in eavesdropping that lead to inference attacks, such as ...