Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 4Article No.: 208, Pages 1–27https://doi.org/10.1145/3699780Earables, or ear wearables, are increasingly being used for a variety of personal applications, prompting the development of authentication schemes to safeguard user privacy. Existing authentications are designed for traditional in-ear earphones, relying ...
- research-articleNovember 2024
mmSpyVR: Exploiting mmWave Radar for Penetrating Obstacles to Uncover Privacy Vulnerability of Virtual Reality
- Luoyu Mei,
- Ruofeng Liu,
- Zhimeng Yin,
- Qingchuan Zhao,
- Wenchao Jiang,
- Shuai Wang,
- Shuai Wang,
- Kangjie Lu,
- Tian He
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 4Article No.: 172, Pages 1–29https://doi.org/10.1145/3699772Virtual reality (VR), while enhancing user experiences, introduces significant privacy risks. This paper reveals a novel vulnerability in VR systems that allows attackers to capture VR privacy through obstacles utilizing millimeter-wave (mmWave) signals ...
- research-articleNovember 2024
Governing Open Vocabulary Data Leaks Using an Edge LLM through Programming by Example
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 4Article No.: 179, Pages 1–31https://doi.org/10.1145/3699760A major concern with integrating large language model (LLM) services (e.g., ChatGPT) into workplaces is that employees may inadvertently leak sensitive information through their prompts. Since user prompts can involve arbitrary vocabularies, conventional ...
- research-articleNovember 2024
Moat: Adaptive Inside/Outside Detection System for Smart Homes
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 4Article No.: 157, Pages 1–31https://doi.org/10.1145/3699751Smart-home technology is now pervasive, demanding increased attention to the security of the devices and the privacy of the home's residents. To assist residents in making security and privacy decisions - e.g., whether to allow a new device to connect to ...
- research-articleSeptember 2024
PrivateGaze: Preserving User Privacy in Black-box Mobile Gaze Tracking Services
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 99, Pages 1–28https://doi.org/10.1145/3678595Eye gaze contains rich information about human attention and cognitive processes. This capability makes the underlying technology, known as gaze tracking, a critical enabler for many ubiquitous applications and has triggered the development of easy-to-...
-
- research-articleSeptember 2024
Empowering IoT Developers with Privacy-Preserving End-User Development Tools
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 90, Pages 1–47https://doi.org/10.1145/3678588Internet of Things applications (IoT) have the potential to derive sensitive user data, necessitating adherence to privacy and data protection laws. However, developers often struggle with privacy issues, resulting in personal data misuse. Despite the ...
- research-articleSeptember 2024
ShouldAR: Detecting Shoulder Surfing Attacks Using Multimodal Eye Tracking and Augmented Reality
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 97, Pages 1–23https://doi.org/10.1145/3678573Shoulder surfing attacks (SSAs) are a type of observation attack designed to illicitly gather sensitive data from "over the shoulder" of victims. This attack can be directed at mobile devices, desktop screens, Personal Identification Number (PIN) pads at ...
- research-articleSeptember 2024
PuppetMouse: Practical and Contactless Mouse Manipulation Attack via Intentional Electromagnetic Interference Injection
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 125, Pages 1–30https://doi.org/10.1145/3678570Mouse is a ubiquitous input tool crucial for user-computer interaction in modern society. However, the inherent trust in the mouse may pose security risks. If the mouse is maliciously manipulated, the connected computer could be secretly controlled, ...
- research-articleSeptember 2024
Parent and Educator Concerns on the Pedagogical Use of AI-Equipped Social Robots
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 120, Pages 1–34https://doi.org/10.1145/3678556Social robots equipped with conversational artificial intelligence are becoming increasingly common in educational settings. However, the long-term consequences of such uses remain relatively unknown due to their novelty. To ensure children's safe use of ...
- research-articleSeptember 2024
End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 89, Pages 1–28https://doi.org/10.1145/3678517The Amazon Alexa marketplace has grown rapidly in recent years due to third-party developers creating large amounts of content and publishing directly to a skills store. Despite the growth of the Amazon Alexa skills store, there have been several ...
- research-articleSeptember 2024
Evaluating the Privacy Valuation of Personal Data on Smartphones
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 100, Pages 1–33https://doi.org/10.1145/3678509Smartphones hold a great variety of personal data during usage, which at the same time poses privacy risks. In this paper, we used the selling price to reflect users' privacy valuation of their personal data on smartphones. In a 7-day auction, they sold ...
- research-articleMay 2024
PPG-Hear: A Practical Eavesdropping Attack with Photoplethysmography Sensors
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 2Article No.: 82, Pages 1–28https://doi.org/10.1145/3659603Photoplethysmography (PPG) sensors have become integral components of wearable and portable health devices in the current technological landscape. These sensors offer easy access to heart rate and blood oxygenation, facilitating continuous long-term ...
- research-articleMarch 2024
EarSlide: a Secure Ear Wearables Biometric Authentication Based on Acoustic Fingerprint
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 1Article No.: 24, Pages 1–29https://doi.org/10.1145/3643515Ear wearables (earables) are emerging platforms that are broadly adopted in various applications. There is an increasing demand for robust earables authentication because of the growing amount of sensitive information and the IoT devices that the earable ...
- research-articleMarch 2024
AFace: Range-flexible Anti-spoofing Face Authentication via Smartphone Acoustic Sensing
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 1Article No.: 26, Pages 1–33https://doi.org/10.1145/3643510User authentication on smartphones needs to balance both security and convenience. Many image-based face authentication methods are vulnerable to spoofing and are plagued by privacy breaches, so models based on acoustic sensing have emerged to achieve ...
- research-articleMarch 2024
Kirigami: Lightweight Speech Filtering for Privacy-Preserving Activity Recognition using Audio
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 1Article No.: 36, Pages 1–28https://doi.org/10.1145/3643502Audio-based human activity recognition (HAR) is very popular because many human activities have unique sound signatures that can be detected using machine learning (ML) approaches. These audio-based ML HAR pipelines often use common featurization ...
- research-articleJanuary 2024
PASTEL: Privacy-Preserving Federated Learning in Edge Computing
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 4Article No.: 204, Pages 1–29https://doi.org/10.1145/3633808Federated Learning (FL) aims to improve machine learning privacy by allowing several data owners in edge and ubiquitous computing systems to collaboratively train a model, while preserving their local training data private, and sharing only model ...
- research-articleJanuary 2024
DIPA2: An Image Dataset with Cross-cultural Privacy Perception Annotations
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 4Article No.: 192, Pages 1–30https://doi.org/10.1145/3631439The world today is increasingly visual. Many of the most popular online social networking services are largely powered by images, making image privacy protection a critical research topic in the fields of ubiquitous computing, usable security, and human-...
- research-articleJanuary 2024
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 4Article No.: 160, Pages 1–24https://doi.org/10.1145/3631432Unlawful wireless cameras are often hidden to secretly monitor private activities. However, existing methods to detect and localize these cameras are interactively complex or require expensive specialized hardware. In this paper, we present LocCams, an ...
- research-articleJanuary 2024
Aragorn: A Privacy-Enhancing System for Mobile Cameras
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 4Article No.: 181, Pages 1–31https://doi.org/10.1145/3631406Mobile app developers often rely on cameras to implement rich features. However, giving apps unfettered access to the mobile camera poses a privacy threat when camera frames capture sensitive information that is not needed for the app's functionality. To ...
- research-articleSeptember 2023
VibPath: Two-Factor Authentication with Your Hand's Vibration Response to Unlock Your Phone
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 3Article No.: 91, Pages 1–26https://doi.org/10.1145/3610894Technical advances in the smart device market have fixated smartphones at the heart of our lives, warranting an ever more secure means of authentication. Although most smartphones have adopted biometrics-based authentication, after a couple of failed ...