共 24 条
- [1] Representing the worldwide mobile communications industry, (2021)
- [2] Solid growth ahead for security products and services, (2019)
- [3] Maggi F, Volpatto A, Gasparini S, Boracchi G, Zanero S., A fast eavesdropping attack against touchscreens, Proc. of the 7th Int'l Conf. on Information Assurance and Security (IAS), pp. 320-325, (2011)
- [4] Yue Q, Ling Z, Fu X, Liu B, Ren K, Zhao W., Blind recognition of touched keys on mobile devices, Proc. of the 2014 ACM SIGSAC Conf. on Computer and Communications Security, pp. 1403-1414, (2014)
- [5] Xu Y, Heinly J, White AM, Monrose F, Frahm JM., Seeing double: Reconstructing obscured typed input from repeated compromising reflections, Proc. of the 2013 ACM SIGSAC Conf. on Computer & Communications Security, pp. 1063-1074, (2013)
- [6] Zhou M, Wang Q, Yang J, Li Q, Xiao F, Wang Z, Chen X., Patternlistener: Cracking Android pattern lock using acoustic signals, Proc. of the 2018 ACM SIGSAC Conf. on Computer and Communications Security, pp. 1775-1787, (2018)
- [7] Aviv AJ, Gibson KL, Mossop E, Blaze M, Smith JM., Smudge attacks on smartphone touch screens, Woot, 10, pp. 1-7, (2010)
- [8] Jung J H, Kim JY, Lee HC, Yi JH., Repackaging attack on Android banking applications and its countermeasures, Wireless Personal Communications, 73, 4, pp. 1421-1437, (2013)
- [9] Aonzo S, Merlo A, Tavella G, Fratantonio Y., Phishing attacks on modern Android, Proc. of the 2018 ACM SIGSAC Conf. on Computer and Communications Security, pp. 1788-1801, (2018)
- [10] Shi L, Fu J, Guo Z, Ming J., Jekyll and Hyde" is risky: Shared-everything threat mitigation in dual-instance apps, Proc. of the 17th Annual Int'l Conf. on Mobile Systems, Applications, and Services, pp. 222-235, (2019)