@inproceedings{2311e70854804e5088262e04d7f2b2b1,
title = "Brief Announcement: Deriving Context for Touch Events",
abstract = "To quantify the amount of high-level context information which can be derived by observing only a user{\textquoteright}s touchscreen interactions, we performed a user study, in which we recorded 160 touch interaction sessions from users running different applications, and then applied both classical machine learning methods and deep learning methods to the results. Our results show that it is possible to derive higher-level user context information based on touch events alone, validating the efficacy of touch injection attacks.",
keywords = "Machine learning, Malicious hardware, Smart phone",
author = "Moran Azran and Shabat, {Niv Ben} and Tal Shkolnik and Yossi Oren",
note = "Funding Information: This research was supported by Israel Science Foundation grants 702/16 and 703/16. Publisher Copyright: {\textcopyright} 2018, Springer International Publishing AG, part of Springer Nature.; 2nd International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018 ; Conference date: 21-06-2018 Through 22-06-2018",
year = "2018",
month = jun,
day = "17",
doi = "10.1007/978-3-319-94147-9_23",
language = "American English",
isbn = "9783319941462",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "283--286",
editor = "Itai Dinur and Shlomi Dolev and Sachin Lodha",
booktitle = "Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Proceedings",
address = "Germany",
}