{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T05:10:37Z","timestamp":1725167437632},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T00:00:00Z","timestamp":1562284800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T00:00:00Z","timestamp":1562284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004063","name":"Knut and Alice Wallenberg Foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s10207-019-00449-8","type":"journal-article","created":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T11:02:41Z","timestamp":1562324561000},"page":"213-228","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["SonarSnoop: active acoustic side-channel attacks"],"prefix":"10.1007","volume":"19","author":[{"given":"Peng","family":"Cheng","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8397-9661","authenticated-orcid":false,"given":"Ibrahim Ethem","family":"Bagci","sequence":"additional","affiliation":[]},{"given":"Utz","family":"Roedig","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,5]]},"reference":[{"key":"449_CR1","unstructured":"Asonov, D., Agrawal, R.: Keyboard acoustic emanations. In: Proceedings of the IEEE Symposium on S&P\u201904 (2004)"},{"key":"449_CR2","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proceedings of the Usenix WOOT\u201910 (2010)"},{"key":"449_CR3","doi-asserted-by":"crossref","unstructured":"Aviv, A.J., Sapp, B., Blaze, M., Smith, J.M.: Practicality of accelerometer side channels on smartphones. In: Proceedings of the ACSAC\u201912 (2012)","DOI":"10.1145\/2420950.2420957"},{"key":"449_CR4","unstructured":"Backes, M., D\u00fcrmuth, M., Gerling, S., Pinkal, M., Sporleder, C.: Acoustic side-channel attacks on printers. In: Proceedings of the USENIX Security\u201910 (2010)"},{"key":"449_CR5","unstructured":"Belikovetsky, S., Solewicz, Y., Yampolskiy, M., Toh, J., Elovici, Y.: Detecting cyber-physical attacks in additive manufacturing using digital audio signing. arXiv preprint \narXiv:1705.06454\n\n (2017)"},{"key":"449_CR6","doi-asserted-by":"crossref","unstructured":"Berger, Y., Wool, A., Yeredor, A.: Dictionary attacks using keyboard acoustic emanations. In: Proceedings of the CCS\u201906 (2006)","DOI":"10.1145\/1180405.1180436"},{"key":"449_CR7","doi-asserted-by":"crossref","unstructured":"Cai, L., Machiraju, S., Chen, H.: Defending against sensor-sniffing attacks on mobile phones. In: Proceedings of thr MobiHeld\u201909 (2009)","DOI":"10.1145\/1592606.1592614"},{"key":"449_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, P., Bagci, I. E., Roedig, U., Yan, J.: SonarSnoop: Active Acoustic Side-Channel Attacks. arXiv preprint \narXiv:1808.10250\n\n. (2018)","DOI":"10.1007\/s10207-019-00449-8"},{"issue":"1","key":"449_CR9","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/3078622","volume":"2","author":"SR Chhetri","year":"2018","unstructured":"Chhetri, S.R., Canedo, A., Faruque, M.A.A.: Confidentiality breach through acoustic side-channel in cyber-physical additive manufacturing systems. ACM Trans. Cyber Phys. Syst. 2(1), 3 (2018)","journal-title":"ACM Trans. Cyber Phys. Syst."},{"key":"449_CR10","doi-asserted-by":"crossref","unstructured":"Cho, G., Huh, J.H., Cho, J., Oh, S., Song, Y., Kim, H.: SysPal: System-guided pattern locks for android. In: Proceedings of the IEEE Symposium on S&P\u201917 (2017)","DOI":"10.1109\/SP.2017.61"},{"key":"449_CR11","doi-asserted-by":"crossref","unstructured":"Compagno, A., Conti, M., Lain, D., Tsudik, G.: Don\u2019t Skype & Type!: Acoustic eavesdropping in voice-over-IP. In: Proceedings of the ASIA CCS\u201917 (2017)","DOI":"10.1145\/3052973.3053005"},{"key":"449_CR12","unstructured":"Faruque, A., Abdullah, M., Chhetri, S.R., Canedo, A., Wan, J.: Acoustic side-channel attacks on additive manufacturing systems. In: Proceedings of the ICCPS\u201916 (2016)"},{"key":"449_CR13","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the SOUPS\u201912 (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"449_CR14","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-662-44371-2_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"Daniel Genkin","year":"2014","unstructured":"Genkin, D., Shamir, A., Tromer, E.: RSA key extraction via low-bandwidth acoustic cryptanalysis. In: International Cryptology Conference, Springer, pp 444\u2013461 (2014)"},{"key":"449_CR15","doi-asserted-by":"crossref","unstructured":"Hojjati, A., Adhikari, A., Struckmann, K., Chou, E., Tho\u00a0Nguyen, T.N., Madan, K., Winslett, M.S., Gunter, C.A., King, W.P.: Leave your phone at the door: side channels that reveal factory floor secrets. In: Proceedings of the CCS\u201916 (2016)","DOI":"10.1145\/2976749.2978323"},{"key":"449_CR16","doi-asserted-by":"crossref","unstructured":"Liu, J., Wang, Y., Kar, G., Chen, Y., Yang, J., Gruteser, M.: Snooping keystrokes with mm-level audio ranging on a single phone. In: Proceedings of the MobiCom\u201915 (2015)","DOI":"10.1145\/2789168.2790122"},{"key":"449_CR17","doi-asserted-by":"crossref","unstructured":"Maiti, A., Armbruster, O., Jadliwala, M., He, J.: Smartwatch-based keystroke inference attacks and context-aware protection mechanisms. In: Proceedings of the ASIA CCS\u201916 (2016)","DOI":"10.1145\/2897845.2897905"},{"key":"449_CR18","doi-asserted-by":"crossref","unstructured":"Marquardt, P., Verma, A., Carter, H., Traynor, P.: (Sp)iPhone: Decoding vibrations from nearby keyboards using mobile phone accelerometers. In: Proceedings of the CCS\u201911 (2011)","DOI":"10.1145\/2046707.2046771"},{"key":"449_CR19","doi-asserted-by":"crossref","unstructured":"Nandakumar, R., Iyer, V., Tan, D., Gollakota, S.: FingerIO: Using active sonar for fine-grained finger tracking. In: Proceedings of the CHI\u201916 (2016)","DOI":"10.1145\/2858036.2858580"},{"issue":"3","key":"449_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3131897","volume":"1","author":"Rajalakshmi Nandakumar","year":"2017","unstructured":"Nandakumar, R., Takakuwa, A., Kohno, T., Gollakota, S.: CovertBand: Activity information leakage using music. In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1(3), 87 (2017)","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"449_CR21","doi-asserted-by":"crossref","unstructured":"Narain, S., Sanatinia, A., Noubir, G.: Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning. In: Proceedings of the WiSec\u201914 (2014)","DOI":"10.1145\/2627393.2627417"},{"key":"449_CR22","doi-asserted-by":"crossref","unstructured":"Pu, Q., Gupta, S., Gollakota, S., Patel, S.: Whole-home gesture recognition using wireless signals. In: Proceedings of the MobiCom\u201913 (2013)","DOI":"10.1145\/2500423.2500436"},{"key":"449_CR23","doi-asserted-by":"crossref","unstructured":"Simon, L., Anderson, R.: PIN skimmer: inferring PINs through the camera and microphone. In: Proceedings of the SPSM\u201913 (2013)","DOI":"10.1145\/2516760.2516770"},{"issue":"1","key":"449_CR24","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/COMST.2017.2779824","volume":"20","author":"R Spreitzer","year":"2018","unstructured":"Spreitzer, R., Moonsamy, V., Korak, T., Mangard, S.: Systematic classification of side-channel attacks: a case study for mobile devices. IEEE Commun. Surv. Tutor. 20(1), 465\u2013488 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"449_CR25","unstructured":"Toreini, E., Randell, B., Hao, F.: An acoustic side channel attack on enigma. Computing Science Technical Report, Newcastle University (2015)"},{"issue":"2","key":"449_CR26","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/BF00341922","volume":"55","author":"MR Turner","year":"1986","unstructured":"Turner, M.R.: Texture discrimination by Gabor functions. Biol. Cybern. 55(2), 71\u201382 (1986). \nhttps:\/\/doi.org\/10.1007\/BF00341922","journal-title":"Biol. Cybern."},{"key":"449_CR27","doi-asserted-by":"crossref","unstructured":"Uellenbeck, S., D\u00fcrmuth, M., Wolf, C., Holz, T.: Quantifying the security of graphical passwords: the case of android unlock patterns. In: Proceedings of the CCS\u201913 (2013)","DOI":"10.1145\/2508859.2516700"},{"key":"449_CR28","doi-asserted-by":"crossref","unstructured":"Wang, W., Liu, A.X., Sun, K.: Device-free gesture tracking using acoustic signals. In: Proceedings of the MobiCom\u201916 (2016)","DOI":"10.1145\/2973750.2987385"},{"issue":"5","key":"449_CR29","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1109\/TMC.2010.175","volume":"10","author":"J Wilson","year":"2011","unstructured":"Wilson, J., Patwari, N.: See-through walls: motion tracking using variance-based radio tomography networks. IEEE Trans. Mob. Comput. 10(5), 612\u2013621 (2011)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"449_CR30","doi-asserted-by":"crossref","unstructured":"Ye, G., Tang, Z., Fang, D., Chen, X., In: Kim, K., Taylor, B., Wang, Z. Cracking android pattern lock in five attempts. In: Proceedings of the NDSS\u201917 (2017)","DOI":"10.14722\/ndss.2017.23130"},{"key":"449_CR31","doi-asserted-by":"crossref","unstructured":"Yun, S., Chen, Y.C., Zheng, H., Qiu, L., Mao, W.: Strata: fine-grained acoustic-based device-free tracking. In: Proceedings of the MobiSys\u201917 (2017)","DOI":"10.1145\/3081333.3081356"},{"key":"449_CR32","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the CODASPY\u201912 (2012a)","DOI":"10.1145\/2133601.2133640"},{"key":"449_CR33","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, You, Get off of my market: detecting malicious apps in official and alternative android markets. In: Proceedings of the NDSS\u201912 (2012b)"},{"issue":"1","key":"449_CR34","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1609956.1609959","volume":"13","author":"L Zhuang","year":"2009","unstructured":"Zhuang, L., Zhou, F., Tygar, J.D.: Keyboard acoustic emanations revisited. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(1), 3 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00449-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-019-00449-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00449-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T23:15:51Z","timestamp":1593818151000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-019-00449-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,5]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["449"],"URL":"https:\/\/doi.org\/10.1007\/s10207-019-00449-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,5]]},"assertion":[{"value":"5 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee and with the 1964 Helsinki Declaration and its later amendments or comparable ethical standards. This article does not contain any studies with animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}