When CSI Meets Public WiFi - Inferring Your Mobile Phone Password via WiFi Signals
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
Intro
Background
Online Mobile Payment
Payment Protections
Channel State Information
Existing Works about CSI Based Recognition
CSI - Hand motion
CSI - Finger motion
OUTLINE
Attack Scenario
Challenges
System Design
ICMP based CSI Collection Module
ICMP based CSI Acquirement Module
Second Challenge
Sensitive Input Module
Third Challenge
Data Preprocessing Module
Signal Processing methods
Fourth Challenge
Password Inference Module
Classification between Different Numbers
Infer 6-digit password
Influence factors
Case Study
Limitations
Taught by
ACM CCS