MD

M.G. Duroyon

2 records found

Acoustic Side-Channel Attacks on a Computer Mouse

Predicting Mouse Movements through Emitted Audio

Acoustic side-channel attacks (SCAs) use audio produced by a system to bypass traditional security measures to extract sensitive information. Human interface devices, such as keyboards, have been the focus of such attacks, however, computer mice are input devices that are current ...
Routing Protocol for Low Power and Lossy Networks (RPL) is a routing protocol for Internet of Things (IoT) devices with limited resources. As IoT is becoming prevalent, it is important to secure the underlying protocols that compose it such as RPL. This paper sought to avoid an R ...