Author of the publication

Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses.

, , , , , and . SP, page 1857-1874. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving., , , , , , , , and . ACM Conference on Computer and Communications Security, page 2267-2281. ACM, (2019)Trick or Heat? Attack on Amplification Circuits to Abuse Critical Temperature Control Systems., , , , , and . CoRR, (2019)On Cuba, diplomats, ultrasound, and intermodulation distortion., , and . Comput. Biol. Medicine, (2019)Trick or Heat?: Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks., , , , , and . CCS, page 2301-2315. ACM, (2019)Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing., , , , , and . SP, page 3432-3449. IEEE, (2023)Side Auth: Synthesizing Virtual Sensors for Authentication., and . NSPW, page 35-44. ACM, (2022)Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone., , and . IEEE Symposium on Security and Privacy, page 905-919. IEEE, (2019)Fast and secure distributed read-only file system, , and . ACM Trans. Comput. Syst., 20 (1): 1--24 (2002)Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images., , , , , , , , , and . RAID, page 32-45. ACM, (2023)Position Paper: Space System Threat Models Must Account for Satellite Sensor Spoofing., , , and . SpaceSec, The Internet Society, (2023)