Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382309
|View full text |Cite
|
Sign up to set email alerts
|

How privacy leaks from bluetooth mouse?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Our attack model is easy to launch, as it only requires the user's hand movement patterns to attack the targeted authentication systems. As shown in several prior studies [14,28,38,52], Bluetooth-or WiFi-enabled wearable devices (e.g., smartwatches and wristbands) have become the targets of attacks, and various personal private information (e.g., motion data) has suffered from the increasing risks of leakage and disclosure. In this study, it is assumed that the attacker can gain access to the legitimate user's hand movement patterns by compromising the user's wearable devices.…”
Section: Output: Mimicked Eeg Features a Mimicmentioning
confidence: 99%
“…Our attack model is easy to launch, as it only requires the user's hand movement patterns to attack the targeted authentication systems. As shown in several prior studies [14,28,38,52], Bluetooth-or WiFi-enabled wearable devices (e.g., smartwatches and wristbands) have become the targets of attacks, and various personal private information (e.g., motion data) has suffered from the increasing risks of leakage and disclosure. In this study, it is assumed that the attacker can gain access to the legitimate user's hand movement patterns by compromising the user's wearable devices.…”
Section: Output: Mimicked Eeg Features a Mimicmentioning
confidence: 99%
“…Spoofing Attack. An adversary can launch spoofing attacks by mimicking a user's mobile device and build connections to the user's wearable devices using the adversary's mobile device [15]. If success, the adversary could use his own mobile device to directly access the sensor data from the target user's wearable devices.…”
Section: B Threat Modelsmentioning
confidence: 99%
“…Wang et al showed that the sensors embedded in wrist-worn wearable devices, such as smartwatches and ftness trackers, can be utilized to discriminate mm-level distances of the user's fne-grained hand movements during the key-entry activities [6]. Pan et al showed that it is possible to recover password input with a Bluetooth mouse and an on-screen keyboard by capturing Bluetooth communication packets [7]. It was further reported in [8,9] that adversaries can obtain the readings of sensors in wearable devices via snifng Bluetooth communications and analyzing the data packets.…”
Section: Introductionmentioning
confidence: 99%