MC

353 records found

Authored

Acoustic Side-Channel Attacks on a Computer Mouse

Predicting Mouse Movements through Emitted Audio

Acoustic side-channel attacks (SCAs) use audio produced by a system to bypass traditional security measures to extract sensitive information. Human interface devices, such as keyboards, have been the focus of such attacks, however, computer mice are input devices that are current ...
The Internet of Things industry is expanding rapidly. However, many security breaches occur, and privacy is often at stake in traditional IoT networks. These centralized systems will not be able to cope with dynamically changing environments. In light of these risks, it is crucia ...

BLUFADER

Blurred face detection & recognition for privacy-friendly continuous authentication

Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to pass the former, but the latter is often underestimated or ignored. Unattended or dangling sessions expose users to we ...

Astraea

Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems

Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the single point of failure a ...

Privacy-Preserving Verifiable Double Auctions

An application for electricity trading

Double Auctions are mechanisms to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Bidders and sellers simultaneously submit quantity-price pairs to an auctioneer, denoting the quantity they want to buy or sell at specific prices. The auc ...

Nereus

Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts

Security and privacy issues have become a major hindrance to the broad adoption of Ride-Hailing Services (RHSs). In this article, we introduce a new collusion attack initiated by the Ride-Hailing Service Provider (RHSP) and a driver that could easily link the real riders and t ...

CovertSYS

A systematic covert communication approach for providing secure end-to-end conversation via social networks

While encryption can prevent unauthorized access to a secret message, it does not provide undetectability of covert communications over the public network. Implementing a highly latent data exchange, especially with low eavesdropping/discovery probability, is challenging for prac ...

For your voice only

Exploiting side channels in voice messaging for environment detection

Voice messages are an increasingly well-known method of communication, accounting for more than 200 million messages a day. Sending audio messages requires a user to invest lesser effort compared to texting while enhancing the meaning of the message by adding an emotional context ...

Secure Proximity Detection and Verification

Addressing vulnerabilities in IEEE 802.15.4z UWB

We live in a world where much of our interactions with the environment around us depend on us being physically close to them. For instance, we have proximity­based tokens (e.g., keys and smartcards) for access systems installed at various places such as in cars, at contactless pa ...

SPARK

Secure Pseudorandom Key-based Encryption for Deduplicated Storage

Deduplication is a widely used technology to reduce the storage and communication cost for cloud storage services. For any cloud infrastructure, data confidentiality is one of the primary concerns. Data confidentiality can be achieved via user-side encryption. However, convent ...

Contributed

Acoustic Side-Channel Attacks on a Computer Mouse

Predicting Mouse Movements through Emitted Audio

Acoustic side-channel attacks (SCAs) use audio produced by a system to bypass traditional security measures to extract sensitive information. Human interface devices, such as keyboards, have been the focus of such attacks, however, computer mice are input devices that are current ...

Acoustic Side-Channel Attacks on a Computer Mouse

Predicting Mouse Movements through Emitted Audio

Acoustic side-channel attacks (SCAs) use audio produced by a system to bypass traditional security measures to extract sensitive information. Human interface devices, such as keyboards, have been the focus of such attacks, however, computer mice are input devices that are current ...
The Internet of Things industry is expanding rapidly. However, many security breaches occur, and privacy is often at stake in traditional IoT networks. These centralized systems will not be able to cope with dynamically changing environments. In light of these risks, it is crucia ...
The Internet of Things industry is expanding rapidly. However, many security breaches occur, and privacy is often at stake in traditional IoT networks. These centralized systems will not be able to cope with dynamically changing environments. In light of these risks, it is crucia ...

Privacy-Preserving Verifiable Double Auctions

An application for electricity trading

Double Auctions are mechanisms to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Bidders and sellers simultaneously submit quantity-price pairs to an auctioneer, denoting the quantity they want to buy or sell at specific prices. The auc ...

Privacy-Preserving Verifiable Double Auctions

An application for electricity trading

Double Auctions are mechanisms to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Bidders and sellers simultaneously submit quantity-price pairs to an auctioneer, denoting the quantity they want to buy or sell at specific prices. The auc ...

For your voice only

Exploiting side channels in voice messaging for environment detection

Voice messages are an increasingly well-known method of communication, accounting for more than 200 million messages a day. Sending audio messages requires a user to invest lesser effort compared to texting while enhancing the meaning of the message by adding an emotional context ...

For your voice only

Exploiting side channels in voice messaging for environment detection

Voice messages are an increasingly well-known method of communication, accounting for more than 200 million messages a day. Sending audio messages requires a user to invest lesser effort compared to texting while enhancing the meaning of the message by adding an emotional context ...

Secure Proximity Detection and Verification

Addressing vulnerabilities in IEEE 802.15.4z UWB

We live in a world where much of our interactions with the environment around us depend on us being physically close to them. For instance, we have proximity­based tokens (e.g., keys and smartcards) for access systems installed at various places such as in cars, at contactless pa ...

Secure Proximity Detection and Verification

Addressing vulnerabilities in IEEE 802.15.4z UWB

We live in a world where much of our interactions with the environment around us depend on us being physically close to them. For instance, we have proximity­based tokens (e.g., keys and smartcards) for access systems installed at various places such as in cars, at contactless pa ...