Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone |
40th IEEE Symposium on Security and Privacy
|
DolphinAttack: Inaudible Voice Commands★ |
ACM CCS 2017
|
Dolphin Attacks:Manipulating Voice Controllable Systems silently |
2017 SyScan360 Beijing
|
Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-Driving Vehicles” |
POC2016
|
Imperfections of Accelerometers Make Smartphones Trackable |
POC2015
|