ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1502.03182
  4. Cited By
PowerSpy: Location Tracking using Mobile Device Power Analysis
v1v2v3v4 (latest)

PowerSpy: Location Tracking using Mobile Device Power Analysis

11 February 2015
Yan Michalevsky
Gabi Nakibly
Aaron Schulman
Gunaa Arumugam Veerapandian
Dan Boneh
ArXiv (abs)PDFHTML

Papers citing "PowerSpy: Location Tracking using Mobile Device Power Analysis"

27 / 27 papers shown
Title
RAID: An In-Training Defense against Attribute Inference Attacks in Recommender Systems
RAID: An In-Training Defense against Attribute Inference Attacks in Recommender Systems
Xiaohua Feng
Yuyuan Li
Fengyuan Yu
Ke Xiong
Junjie Fang
Lulu Zhang
Tianyu Du
Chaochao Chen
AAML
98
0
0
15 Apr 2025
Do Not Trust Power Management: Challenges and Hints for Securing Future
  Trusted Execution Environments
Do Not Trust Power Management: Challenges and Hints for Securing Future Trusted Execution Environments
O. L. Gonidec
Maria Méndez Real
Guillaume Bouffard
Jean-Christophe Prévotet
47
0
0
24 May 2024
Enabling Physical Localization of Uncooperative Cellular Devices
Enabling Physical Localization of Uncooperative Cellular Devices
Taekkyung Oh
Sangwook Bae
Junho Ahn
Yonghwa Lee
Dinh-Tuan Hoang
Min Suk Kang
Nils Ole Tippenhauer
Yongdae Kim
33
5
0
22 Mar 2024
Digital Security -- A Question of Perspective. A Large-Scale Telephone
  Survey with Four At-Risk User Groups
Digital Security -- A Question of Perspective. A Large-Scale Telephone Survey with Four At-Risk User Groups
Franziska Herbert
Steffen Becker
Annalina Buckmann
Marvin Kowalewski
Jonas Hielscher
Yasemin Acar
Markus Dürmuth
Jennifer Friedauer
M. Sasse
45
10
0
25 Dec 2022
AutoCAT: Reinforcement Learning for Automated Exploration of
  Cache-Timing Attacks
AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks
Mulong Luo
Wenjie Xiong
G. G. Lee
Yueying Li
Xiaomeng Yang
Amy Zhang
Yuandong Tian
Hsien-Hsin S. Lee
G. E. Suh
AAML
89
11
0
17 Aug 2022
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature
Florian Frank
Wenjie Xiong
Nikolaos Athanasios Anagnostopoulos
André Schaller
T. Arul
F. Koushanfar
Stefan Katzenbeisser
U. Rührmair
Jakub Szefer
18
2
0
03 Aug 2022
VindiCo: Privacy Safeguard Against Adaptation Based Spyware in
  Human-in-the-Loop IoT
VindiCo: Privacy Safeguard Against Adaptation Based Spyware in Human-in-the-Loop IoT
Salma Elmalaki
Bo-Jhang Ho
M. Alzantot
Yasser Shoukry
Mani B. Srivastava
21
2
0
03 Feb 2022
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural
  Network: A Survey
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey
Xiaoyu Zhang
Chao Chen
Yi Xie
Xiaofeng Chen
Jun Zhang
Yang Xiang
FedML
53
7
0
13 May 2021
Who Is Charging My Phone? Identifying Wireless Chargers via Fingerprinting
Zhiyun Wang
Jiayu Zhang
Xiaoyu Ji
Wenyuan Xu
Gang Qu
Minjian Zhao
42
8
0
30 Jul 2020
SeCloak: ARM Trustzone-based Mobile Peripheral Control
SeCloak: ARM Trustzone-based Mobile Peripheral Control
Matthew Lentz
Rijurekha Sen
P. Druschel
Bobby Bhattacharjee
52
69
0
23 Jan 2020
Defending against Machine Learning based Inference Attacks via
  Adversarial Examples: Opportunities and Challenges
Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges
Jinyuan Jia
Neil Zhenqiang Gong
AAMLSILM
82
17
0
17 Sep 2019
Maya: Falsifying Power Sidechannels with Dynamic Control
Maya: Falsifying Power Sidechannels with Dynamic Control
Raghavendra Pradyumna Pothukuchi
Sweta Yamini Pothukuchi
P. Voulgaris
Alex Schwing
Josep Torrellas
23
4
0
22 Jul 2019
Analyzing Defense Strategies Against Mobile Information Leakages: A
  Game-Theoretic Approach
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach
Kavita Kumari
Murtuza Jadliwala
Anindya Maiti
M. Manshaei
AAML
15
1
0
30 Apr 2019
Analysis of Location Data Leakage in the Internet Traffic of
  Android-based Mobile Devices
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices
N. Sivan
Ron Bitton
A. Shabtai
15
5
0
12 Dec 2018
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion
  Sensors
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors
Yanzi Zhu
Zhujun Xiao
Yuxin Chen
Zhijing Li
Max Liu
Ben Y. Zhao
Haitao Zheng
54
57
0
23 Oct 2018
Light Ears: Information Leakage via Smart Lights
Light Ears: Information Leakage via Smart Lights
Anindya Maiti
Murtuza Jadliwala
AAML
36
14
0
23 Aug 2018
Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App
  Sandboxing
Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing
Sashank Narain
G. Noubir
16
8
0
13 Aug 2018
Addressing Security and Privacy Challenges in Internet of Things
Addressing Security and Privacy Challenges in Internet of Things
Arsalan Mosenia
13
5
0
18 Jul 2018
Nothing But Net: Invading Android User Privacy Using Only Network Access
  Patterns
Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns
Mikhail Andreev
Avraham Klausner
Trishita Tiwari
A. Trachtenberg
Arkady Yerukhimovich
MLAU
13
3
0
07 Jul 2018
AttriGuard: A Practical Defense Against Attribute Inference Attacks via
  Adversarial Machine Learning
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
Jinyuan Jia
Neil Zhenqiang Gong
AAML
72
166
0
13 May 2018
PinMe: Tracking a Smartphone User around the World
PinMe: Tracking a Smartphone User around the World
Arsalan Mosenia
Xiaoliang Dai
Prateek Mittal
N. Jha
48
36
0
05 Feb 2018
Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as
  a Side-Channel
Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel
Anindya Maiti
R. Heard
Mohd Sabra
Murtuza Jadliwala
38
2
0
30 Sep 2017
Systematic Classification of Side-Channel Attacks: A Case Study for
  Mobile Devices
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
Raphael Spreitzer
Veelasha Moonsamy
Thomas Korak
Stefan Mangard
AAML
87
215
0
11 Nov 2016
Multi-label Methods for Prediction with Sequential Data
Multi-label Methods for Prediction with Sequential Data
Jesse Read
Luca Martino
Jaakko Hollmén
46
29
0
27 Sep 2016
Your Neighbors Are My Spies: Location and other Privacy Concerns in
  GLBT-focused Location-based Dating Applications
Your Neighbors Are My Spies: Location and other Privacy Concerns in GLBT-focused Location-based Dating Applications
Nguyen Phong Hoang
Yasuhito Asano
Masatoshi Yoshikawa
29
25
0
20 Apr 2016
A Study on Power Side Channels on Mobile Devices
A Study on Power Side Channels on Mobile Devices
Lin Yan
Yao Guo
Xiangqun Chen
Hong Mei
63
56
0
25 Dec 2015
Design and implementation of an Android application to anonymously
  analyse locations of the citizens in Barcelona
Design and implementation of an Android application to anonymously analyse locations of the citizens in Barcelona
Ángel Torres Moreira
M. Aguilar-Igartua
Silvia Puglisi
37
3
0
16 Jul 2015
1