Whitepaper called iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections. The authors investigate the implications of the ubiquity of personal mobile devices and reveal new techniques for compromising the privacy of users typing on virtual keyboards.
60b7681fb94a33a6c412266114a942f9cd9a18a4b3db0a3554e8c4298fb91873