Highlighted Publications
Our work on thermal attacks has been published at top HCI and Security Venues such as ACM TOPS, ACM IUI, and alike. Below are selected publications. To see a full list of publications, please visit this link.
-
-
- . "Change Policy or Users? Mitigating the Security Risks of Thermal Attacks." In the CHI 2023 workshop on Designing Technology and Policy Simultaneously: Towards A Research Agenda and New Practice.
- In this paper, we propose an AI-driven strategy to obfuscate vulnerable interfaces in the view of thermal cameras automatically, then discuss the advantages and limitations of attempting to enforce such a system-centred solution as policy, versus instead attempting to shape user behaviour.
- In this paper, we propose an AI-driven strategy to obfuscate vulnerable interfaces in the view of thermal cameras automatically, then discuss the advantages and limitations of attempting to enforce such a system-centred solution as policy, versus instead attempting to shape user behaviour.
- Norah Alotaibi, John Williamson, Mohamed Khamis. "ThermoSecure: Investigating the effectiveness of AI-driven thermal attacks on commonly used computer keyboards." ACM Transactions on Privacy and Security. 2022.
- In this work, we examined the feasibility of thermal attacks on commonly used computer keyboards. We presented ThermoSecure, a system that analyzes thermal images to estimate user input. We also presented the first publicly available dataset of 1500 thermal images of keyboards.
- In this work, we present usability (N=17) and security (N=24) evaluations to compare PIN entry with the standard vs randomized layout. Our results show that randomizing the layout increases resistance to shoulder surfing and thermal attacks significantly.
- In this work, we conducted an online study with 101 participants to investigate the risk of thermal attacks in users’ daily lives. Our results suggest that users frequently leave their touchscreen devices unattended. Furthermore, users are often at risk of thermal attacks due to their authentication method, allowing attackers to use thermal traces to reconstruct previously entered PINS and passwords.
- In this research work, we implemented deep-learning models to detect interfaces and heat traces from thermal images. Four image obfuscation methods have been utilized to eliminate heat traces from the detected interfaces. Our preliminary results show that the proposed models can detect interfaces in thermal images and obfuscate the heat traces on them.
- In this paper, we investigate the effectiveness of thermal attacks against the input of text with different characteristics on a smartphone touchscreen and a laptop keyboard. We found that long and complex strings are less vulnerable to thermal attacks, that visual inspection of thermal images reveals different parts of the entered text even if the attack is not entirely successful, and that entering text on laptops is more vulnerable to thermal attacks than on smartphones.