22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedde 2017
DOI: 10.1109/cse-euc.2017.221
|View full text |Cite
|
Sign up to set email alerts
|

Protect Sensitive Information against Channel State Information Based Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…Wi‐Fi CSI is revealed to be very beneficial in carrying out security and privacy attacks in both home and public Wi‐Fi infrastructure. Through the analysis of how the finger and hand motions influence CSI, CSI‐based attacks are seen to be able to rebuild on‐screen or text‐based passwords successfully, and on‐screen login patterns and on‐screen login patterns 52 …”
Section: Potential Abuse Of Wi‐fi Signalsmentioning
confidence: 99%
“…Wi‐Fi CSI is revealed to be very beneficial in carrying out security and privacy attacks in both home and public Wi‐Fi infrastructure. Through the analysis of how the finger and hand motions influence CSI, CSI‐based attacks are seen to be able to rebuild on‐screen or text‐based passwords successfully, and on‐screen login patterns and on‐screen login patterns 52 …”
Section: Potential Abuse Of Wi‐fi Signalsmentioning
confidence: 99%
“…The high frequent data exchange ensures that the attacker can obtain the user's input with a high resolution. Our work leverages this pattern to detect potential CSI-based attacks by monitoring the number of ICMP packets sent within an observation window [34].…”
Section: Risk Assessmentmentioning
confidence: 99%
“…several typical strategies used by the participants, such as people often picked the top left corner as a starting point and prefer straight lines, the graphical patterns used in the experiments are chosen according to the strategies and they were also used in prior work [31,34]. The structure of these patterns ranges from simple to complex.…”
Section: P1 P2mentioning
confidence: 99%
See 1 more Smart Citation
“…However, it is not safe to use mobile devices in such an environment, because by analyzing the influence of user's finger movements on channel state information (CSI) when the user enters the password, the attackers can steal user's sensitive information, such as passwords, PINs, security codes, etc. We call this kind of attack a "CSI-based attack" [1].…”
Section: Introductionmentioning
confidence: 99%