Seguir
Simon Eberz
Simon Eberz
Dirección de correo verificada de cs.ox.ac.uk - Página principal
Título
Citado por
Citado por
Año
Evaluating behavioral biometrics for continuous authentication: challenges and metrics
S Eberz, KB Rasmussen, V Lenders, I Martinovic
ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017, 2017
1202017
A practical man-in-the-middle attack on signal-based key generation protocols
S Eberz, M Strohmeier, M Wilhelm, I Martinovic
European Symposium on Research in Computer Security, 235-252, 2012
1102012
Broken Hearted: How To Attack ECG Biometrics
S Eberz, A Patané, N Paoletti, M Kwiatkowska, M Roeschlin, I Martinovic
2017 Network and Distributed System Security (NDSS) Symposium, 2017
1042017
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
S Eberz, KB Rasmussen, V Lenders, I Martinovic
2015 Network and Distributed System Security (NDSS) Symposium, 2015
932015
Peeves: Physical Event Verification in Smart Homes
S Birnbach, S Eberz, I Martinovic
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
892019
Seeing red: PPG biometrics using smartphone cameras
G Lovisotto, H Turner, S Eberz, I Martinovic
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
532020
Looks like eve: Exposing insider threats using eye movement biometrics
S Eberz, KB Rasmussen, V Lenders, I Martinovic
ACM Transactions on Privacy and Security (TOPS) 19 (1), 1-31, 2016
482016
Biometric backdoors: A poisoning attack against unsupervised template updating
G Lovisotto, S Eberz, I Martinovic
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 184-197, 2020
472020
28 blinks later: Tackling practical challenges of eye movement biometrics
S Eberz, G Lovisotto, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
382019
When your fitness tracker betrays you: Quantifying the predictability of biometric features across contexts
S Eberz, G Lovisotto, A Patane, M Kwiatkowska, V Lenders, I Martinovic
2018 IEEE Symposium on Security and Privacy (SP), 889-905, 2018
372018
Haunted house: physical smart home event verification in the presence of compromised sensors
S Birnbach, S Eberz, I Martinovic
ACM Transactions on Internet of Things 3 (3), 1-28, 2022
262022
Common evaluation pitfalls in touch-based authentication systems
M Georgiev, S Eberz, H Turner, G Lovisotto, I Martinovic
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
112022
Watchauth: User authentication and intent recognition in mobile payments using a smartwatch
J Sturgess, S Eberz, I Sluganovic, I Martinovic
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 377-391, 2022
92022
# PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones
S Birnbach, R Baker, S Eberz, I Martinovic
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-34, 2021
72021
RingAuth: Wearable Authentication using a Smart Ring
J Sturgess, S Birnbach, S Eberz, I Martinovic
arXiv preprint arXiv:2301.03594, 2022
42022
Techniques for Continuous Touch-Based Authentication
M Georgiev, S Eberz, I Martinovic
International Conference on Information Security Practice and Experience …, 2022
42022
Recurring Turking: Conducting Daily Task Studies on Mechanical Turk
H Turner, S Eberz, I Martinovic
arXiv preprint arXiv:2104.12675, 2021
42021
Inferring user height and improving impersonation attacks in mobile payments using a smartwatch
J Sturgess, S Eberz, I Sluganovic, I Martinovic
2022 IEEE International Conference on Pervasive Computing and Communications …, 2022
32022
Fingerprinting and personal information leakage from touchscreen interactions
M Georgiev, S Eberz, I Martinovic
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 145-157, 2022
22022
Techniques for Continuous Touch-Based Authentication Modeling
M Georgiev, S Eberz, I Martinovic
arXiv preprint arXiv:2207.12140, 2022
22022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20