Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978397
|View full text |Cite
|
Sign up to set email alerts
|

When CSI Meets Public WiFi

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 137 publications
(38 citation statements)
references
References 21 publications
0
36
0
Order By: Relevance
“…This type of attack infers the keystrokes by recording changes from the channel state information corresponding to hand or finger movements. There are approaches like WiKey [4] and WindTalker [5] which get the keystrokes on a physical and soft keyboards respectively using external WiFi access points as signal sources. WiPass [6] is presented as a way of getting passwords and authentication patterns using the victim's smartphone personal hotspot as emanation font or, recently, Shen et al [7] present a similar approach to Ali et al [4] and Li et al [5] but using a different classification model.…”
Section: A Wifi-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…This type of attack infers the keystrokes by recording changes from the channel state information corresponding to hand or finger movements. There are approaches like WiKey [4] and WindTalker [5] which get the keystrokes on a physical and soft keyboards respectively using external WiFi access points as signal sources. WiPass [6] is presented as a way of getting passwords and authentication patterns using the victim's smartphone personal hotspot as emanation font or, recently, Shen et al [7] present a similar approach to Ali et al [4] and Li et al [5] but using a different classification model.…”
Section: A Wifi-basedmentioning
confidence: 99%
“…There are approaches like WiKey [4] and WindTalker [5] which get the keystrokes on a physical and soft keyboards respectively using external WiFi access points as signal sources. WiPass [6] is presented as a way of getting passwords and authentication patterns using the victim's smartphone personal hotspot as emanation font or, recently, Shen et al [7] present a similar approach to Ali et al [4] and Li et al [5] but using a different classification model. These attacks cannot tolerate changes in the environment other than the victim's hand or finger movement.…”
Section: A Wifi-basedmentioning
confidence: 99%
“…Some other studies of RAP using the agent, were conducted by Chatfield and Haddad [71], with cosine similarity and data sectoring of RSSI, for identifying the presence of RAP. Li et al [72] proposed a framework to Protect the users from the sensitive keystrokes that reflected by CSI, while Sharma and Gupta [73] developing the three-layered IDS security system, to encounter the RAP and also protecting the user.…”
Section: Agent Deploymentmentioning
confidence: 99%
“…WiFi based fine-grained activities sensing: With the availability of CSI readings from commodity WiFi devices [32], significant progresses have been made for contactless sensing, enabling new fine-grained activity sensing applications such as keystroke identification [48], hand gesture recognition [20], [21], [49], [50], vital sign monitoring [51], [52], [53], [24], [25], [54], [55], and speaking tracking [56]. For non-periodical activity recognition, WiHear was developed as a lip-reading system that uses WiFi CSI to recognize lip movements, which requires directional antennas and is very sensitive to environment changes [56].…”
Section: Related Workmentioning
confidence: 99%