[1] 李春玲. 抗侧信道攻击Fixed-base Comb算法设计[J]. 青海师范大学学报:自然科学版,2006(4):41-45,57. [2] BERGER Y,WOOL A,YEREDOR A.Dictionary attacks using keyboard acoustic emanations[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. Alexandria Virginia USA.ACM,2006:245-254. [3] FOO KUNE D, KIM Y.Timing attacks on PIN input devices[C]//Proceedings of the 17th ACM Conference on Computer and Communications Security. Chicago Illinois USA. ACM, 2010: 678-680. [4] LIU J,WANG Y,KAR G,et al.Snooping keystrokes with mm-level audio ranging on a Single phone[C]//Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. Paris France. ACM,2015:142-154. [5] LU L,YU J,CHEN Y,et al.Keylistener: inferring keystrokes on qwerty keyboard of touch screen through acoustic signals[C]//IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE,2019:775-783. [6] SHUMAILOV I,SIMON L,YAN J,et al. Hearing your touch:A new acoustic side channel on smartphones[EB/OL].2019:1903.11137. https://arxiv.org/abs/1903.11137v1. [7] ZHU T,MA Q,ZHANG S,et al.Context-free attacks using keyboard acoustic emanations[C]//Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. Scottsdale Arizona USA. ACM,2014:453-464. [8] BACKES M,CHEN T,DÜRMUTH M,et al. Tempest in a teapot:compromising reflections revisited[C]//2009 30th IEEE Symposium on Security and Privacy. Oakland,CA,USA.IEEE,2009:315-327. [9] BACKES M,DÜRMUTH M,UNRUH D. Compromising reflections-or-how to read LCD monitors around the corner[C]//2008 IEEE Symposium on Security and Privacy(sp 2008). Oakland,CA,USA. IEEE,2008:158-169. [10] CHEN Y,LI T,ZHANG R,et al.Eyetell:video-assisted touchscreen keystroke inference from eye movements[C]//2018 IEEE Symposium on Security and Privacy(SP). San Francisco,CA.IEEE,2018:144-160. [11] RAGURAM R,WHITE A M,GOSWAMI D,et al.ISpy:automatic reconstruction of typed input from compromising reflections[C]//Proceedings of the 18th ACM Conference on Computer and Communications Security. Chicago Illinois USA. ACM,2011:527-536. [12] WANG Y,CAI W D,GU T,et al.Your eyes reveal your secrets:an eye movement based password inference on smartphone[J]. IEEE Transactions on Mobile Computing,2020,19(11):2714-2730. [13] WANG Y,CAI W D,GU T,et al.GazeRevealer:inferring password using smartphone front camera[C]//Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems:Computing,Networking and Services. New York NY USA. ACM,2018:254-263. [14] XU Y,HEINLY J,WHITE A M,et al.Seeing double:reconstructing obscured typed input from repeated compromising reflections[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security-CCS’13. Berlin,Germany. ACM Press,2013:1063-1074. [15] ALI K,LIU A X,WANG W,et al.Keystroke recognition using WiFi signals[C]//Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. Paris France. ACM,2015:90-102. [16] FANG S,MARKWOOD I,LIU Y,et al.No training hurdles: fast training-agnostic attacks to infer your typing[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Toronto Canada:ACM. 2018:1747-1760. [17] LI M,MENG Y,LIU J,et al.When CSI meets public WiFi:inferring your mobile phone password via WiFi signals[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Vienna Austria. ACM,2016:1068-1079. [18] LING K,LIU Y,SUN K,et al.SpiderMon:towards using cell towers as illuminating sources for keystroke monitoring[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE,2020:666-675. [19] VUAGNOUX M,PASINI S.Compromising electromagnetic emanations of wired and wireless keyboards[J]. Proceedings of the 18th USENIX Security Symposium,2009:1-16. [20] DU Y L,LU Y H,ZHANG J L.Novel method to detect and recover the keystrokes of ps/2 keyboard[J]. Progress in Electromagnetics Research C,2013,41:151-161. [21] WANG L,YU B.Analysis and measurement on the electromagnetic compromising emanations of computer keyboards[C]//2011 Seventh International Conference on Computational Intelligence and Security. IEEE,2011:640-643. [22] 区健昌. 电子设备的电磁兼容性设计[M]. 北京:电子工业出版社,2003. [23] JIN W Q,MURALI S,ZHU H D,et al.Periscope:A keystroke inference attack using human coupled electromagnetic emanations[C]//Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Virtual Event Republic of Korea. ACM,2021:700-714. [24] LEHTINEN R,RUSSELL D,GANGEMI SR G T. Computer security basics[M]. Sebastopol,California:O’Reilly Media Inc.,2006. |