Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Trusted Sensors and Their Applications

We are building mobile systems that offer security primitives (for example, authentication, access control) based on a mobile device's sensor readings. To remain secure, our systems must be able to attest the validity of the sensor readings to ensure that these readings have not been altered or fabricated.