Author of the publication

Acoustics to the Rescue: Physical Key Inference Attack Revisited.

, , , , , , , and . USENIX Security Symposium, page 3255-3272. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Acoustics to the Rescue: Physical Key Inference Attack Revisited., , , , , , , and . USENIX Security Symposium, page 3255-3272. USENIX Association, (2021)SoundUAV: Fingerprinting Acoustic Emanations for Delivery Drone Authentication., , and . MobiSys, page 632-633. ACM, (2019)TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals., , , , and . CCS, page 2475-2489. ACM, (2022)RampScope: Ramp-Level Localization of Shared Mobility Devices Using Sidewalk Ramps., , , and . HotMobile, page 49-54. ACM, (2023)MagTracer: Detecting GPU Cryptojacking Attacks via Magnetic Leakage Signals., , , , and . MobiCom, page 68:1-68:15. ACM, (2023)RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems., , , , , and . CoRR, (2022)Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints., , , , and . NDSS, The Internet Society, (2019)RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems., , , , , and . ACM Trans. Cyber Phys. Syst., 8 (1): 5:1-5:25 (January 2024)Listen to Your Key: Towards Acoustics-based Physical Key Inference., , and . HotMobile, page 3-8. ACM, (2020)