{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:54:47Z","timestamp":1723017287449},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/ccnc.2016.7444763","type":"proceedings-article","created":{"date-parts":[[2016,3,31]],"date-time":"2016-03-31T21:13:05Z","timestamp":1459458785000},"source":"Crossref","is-referenced-by-count":21,"title":["Side-channel attacks on mobile and wearable systems"],"prefix":"10.1109","author":[{"given":"Ani","family":"Nahapetian","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420957"},{"key":"ref12","article-title":"Acoustic side-channel attacks on printers","author":"backes","year":"2010","journal-title":"Proceedings of the 19th USENIX Conference on Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"ref14","first-page":"1053","article-title":"Gyrophone: recognizing speech from gyroscope signals","author":"michalevsky","year":"2014","journal-title":"Proceedings of the 23rd USENIX conference on Security Symposium (SEC‘14) USENIX Association"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594379"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10484-012-9194-1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.1999998"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742662"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444820"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"ref4","first-page":"1","article-title":"An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0415-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.25"},{"key":"ref6","first-page":"9","article-title":"TouchLogger: inferring keystrokes on touch screen from smartphone motion","author":"cai","year":"2011","journal-title":"Proceedings of the 6th USENIX Conference on Hot Topics in Security USENIX Association"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1592606.1592614"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_16"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"ref2","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","author":"aviv","year":"2010","journal-title":"Proceedings of the 4th USENIX Conference on Offensive Technologies USENIX Association"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"ref1","year":"0","journal-title":"Android Developer Security Permissions"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368569"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1145\/2789168.2790121","article-title":"MoLe: Motion Leaks through Smartwatch Sensors","author":"wang","year":"2015","journal-title":"Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (MobiCom'15)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2802083.2808397"},{"key":"ref24","first-page":"4","article-title":"Who wears me? bioimpedance as a passive biometric","author":"cornelius","year":"2012","journal-title":"The Proceedings of the 3rd USENIX Conference on Health Security and Privacy"},{"key":"ref23","article-title":"I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics","author":"majdanik","year":"2014","journal-title":"Proc of Intl Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2684103.2684152"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2634317.2642868"}],"event":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2016,1,9]]},"end":{"date-parts":[[2016,1,12]]}},"container-title":["2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7435634\/7440162\/7444763.pdf?arnumber=7444763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T09:45:57Z","timestamp":1498297557000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7444763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2016.7444763","relation":{},"subject":[],"published":{"date-parts":[[2016,1]]}}}