Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1502.03182
Cited By
v1
v2
v3
v4 (latest)
PowerSpy: Location Tracking using Mobile Device Power Analysis
11 February 2015
Yan Michalevsky
Gabi Nakibly
Aaron Schulman
Gunaa Arumugam Veerapandian
Dan Boneh
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"PowerSpy: Location Tracking using Mobile Device Power Analysis"
27 / 27 papers shown
Title
RAID: An In-Training Defense against Attribute Inference Attacks in Recommender Systems
Xiaohua Feng
Yuyuan Li
Fengyuan Yu
Ke Xiong
Junjie Fang
Lulu Zhang
Tianyu Du
Chaochao Chen
AAML
98
0
0
15 Apr 2025
Do Not Trust Power Management: Challenges and Hints for Securing Future Trusted Execution Environments
O. L. Gonidec
Maria Méndez Real
Guillaume Bouffard
Jean-Christophe Prévotet
47
0
0
24 May 2024
Enabling Physical Localization of Uncooperative Cellular Devices
Taekkyung Oh
Sangwook Bae
Junho Ahn
Yonghwa Lee
Dinh-Tuan Hoang
Min Suk Kang
Nils Ole Tippenhauer
Yongdae Kim
31
5
0
22 Mar 2024
Digital Security -- A Question of Perspective. A Large-Scale Telephone Survey with Four At-Risk User Groups
Franziska Herbert
Steffen Becker
Annalina Buckmann
Marvin Kowalewski
Jonas Hielscher
Yasemin Acar
Markus Dürmuth
Jennifer Friedauer
M. Sasse
43
10
0
25 Dec 2022
AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks
Mulong Luo
Wenjie Xiong
G. G. Lee
Yueying Li
Xiaomeng Yang
Amy Zhang
Yuandong Tian
Hsien-Hsin S. Lee
G. E. Suh
AAML
89
11
0
17 Aug 2022
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature
Florian Frank
Wenjie Xiong
Nikolaos Athanasios Anagnostopoulos
André Schaller
T. Arul
F. Koushanfar
Stefan Katzenbeisser
U. Rührmair
Jakub Szefer
18
2
0
03 Aug 2022
VindiCo: Privacy Safeguard Against Adaptation Based Spyware in Human-in-the-Loop IoT
Salma Elmalaki
Bo-Jhang Ho
M. Alzantot
Yasser Shoukry
Mani B. Srivastava
21
2
0
03 Feb 2022
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey
Xiaoyu Zhang
Chao Chen
Yi Xie
Xiaofeng Chen
Jun Zhang
Yang Xiang
FedML
48
7
0
13 May 2021
Who Is Charging My Phone? Identifying Wireless Chargers via Fingerprinting
Zhiyun Wang
Jiayu Zhang
Xiaoyu Ji
Wenyuan Xu
Gang Qu
Minjian Zhao
40
8
0
30 Jul 2020
SeCloak: ARM Trustzone-based Mobile Peripheral Control
Matthew Lentz
Rijurekha Sen
P. Druschel
Bobby Bhattacharjee
52
69
0
23 Jan 2020
Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges
Jinyuan Jia
Neil Zhenqiang Gong
AAML
SILM
82
17
0
17 Sep 2019
Maya: Falsifying Power Sidechannels with Dynamic Control
Raghavendra Pradyumna Pothukuchi
Sweta Yamini Pothukuchi
P. Voulgaris
Alex Schwing
Josep Torrellas
21
4
0
22 Jul 2019
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach
Kavita Kumari
Murtuza Jadliwala
Anindya Maiti
M. Manshaei
AAML
13
1
0
30 Apr 2019
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices
N. Sivan
Ron Bitton
A. Shabtai
13
5
0
12 Dec 2018
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors
Yanzi Zhu
Zhujun Xiao
Yuxin Chen
Zhijing Li
Max Liu
Ben Y. Zhao
Haitao Zheng
54
57
0
23 Oct 2018
Light Ears: Information Leakage via Smart Lights
Anindya Maiti
Murtuza Jadliwala
AAML
36
14
0
23 Aug 2018
Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing
Sashank Narain
G. Noubir
14
8
0
13 Aug 2018
Addressing Security and Privacy Challenges in Internet of Things
Arsalan Mosenia
11
5
0
18 Jul 2018
Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns
Mikhail Andreev
Avraham Klausner
Trishita Tiwari
A. Trachtenberg
Arkady Yerukhimovich
MLAU
11
3
0
07 Jul 2018
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
Jinyuan Jia
Neil Zhenqiang Gong
AAML
72
166
0
13 May 2018
PinMe: Tracking a Smartphone User around the World
Arsalan Mosenia
Xiaoliang Dai
Prateek Mittal
N. Jha
46
36
0
05 Feb 2018
Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel
Anindya Maiti
R. Heard
Mohd Sabra
Murtuza Jadliwala
36
2
0
30 Sep 2017
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
Raphael Spreitzer
Veelasha Moonsamy
Thomas Korak
Stefan Mangard
AAML
87
215
0
11 Nov 2016
Multi-label Methods for Prediction with Sequential Data
Jesse Read
Luca Martino
Jaakko Hollmén
46
29
0
27 Sep 2016
Your Neighbors Are My Spies: Location and other Privacy Concerns in GLBT-focused Location-based Dating Applications
Nguyen Phong Hoang
Yasuhito Asano
Masatoshi Yoshikawa
29
25
0
20 Apr 2016
A Study on Power Side Channels on Mobile Devices
Lin Yan
Yao Guo
Xiangqun Chen
Hong Mei
63
56
0
25 Dec 2015
Design and implementation of an Android application to anonymously analyse locations of the citizens in Barcelona
Ángel Torres Moreira
M. Aguilar-Igartua
Silvia Puglisi
35
3
0
16 Jul 2015
1