no code implementations • 6 Feb 2018 • Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac
Specifically, we present a detailed survey about existing sensor-based threats to IoT devices and countermeasures that are developed specifically to secure the sensors of IoT devices.
Cryptography and Security
no code implementations • 1 Apr 2016 • Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli, Trent Jaeger
We evaluate our approach on 17 widely-used apps that make extensive use of the microphone and speaker, finding that AuDroid prevents six types of attack scenarios on audio channels while permitting all 17 apps to run effectively.
Cryptography and Security Operating Systems