{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:36:48Z","timestamp":1729672608636,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T00:00:00Z","timestamp":1529280000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,18]]},"DOI":"10.1145\/3212480.3212498","type":"proceedings-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T16:38:41Z","timestamp":1530203921000},"page":"111-122","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel"],"prefix":"10.1145","author":[{"given":"Anindya","family":"Maiti","sequence":"first","affiliation":[{"name":"Wichita State University"}]},{"given":"Ryan","family":"Heard","sequence":"additional","affiliation":[{"name":"Wichita State University"}]},{"given":"Mohd","family":"Sabra","sequence":"additional","affiliation":[{"name":"Wichita State University"}]},{"given":"Murtuza","family":"Jadliwala","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio"}]}],"member":"320","published-online":{"date-parts":[[2018,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/lifehacker.com\/5376442\/crack-a-master-combination-padlock-redux\/. Online","author":"Master Combination Padlock Redux Crack","year":"2017","unstructured":"Crack a Master Combination Padlock Redux . http:\/\/lifehacker.com\/5376442\/crack-a-master-combination-padlock-redux\/. Online ; accessed 2017 -06-07. Crack a Master Combination Padlock Redux. http:\/\/lifehacker.com\/5376442\/crack-a-master-combination-padlock-redux\/. Online; accessed 2017-06-07."},{"key":"e_1_3_2_1_2_1","volume-title":"What is Your Hand-Orientation & What Wrist Do You Wear Your Watch On? http:\/\/www.ablogtowatch.com\/poll-your-hand-orientation-what-wrist-wear-your-watch\/. Online","author":"Poll","year":"2017","unstructured":"Poll : What is Your Hand-Orientation & What Wrist Do You Wear Your Watch On? http:\/\/www.ablogtowatch.com\/poll-your-hand-orientation-what-wrist-wear-your-watch\/. Online ; accessed 2017 -06-07. Poll: What is Your Hand-Orientation & What Wrist Do You Wear Your Watch On? http:\/\/www.ablogtowatch.com\/poll-your-hand-orientation-what-wrist-wear-your-watch\/. Online; accessed 2017-06-07."},{"volume-title":"According to IDC","author":"Dead Wearables Aren't","key":"e_1_3_2_1_3_1","unstructured":"Wearables Aren't Dead , They're Just Shifting Focus as the Market Grows 16.9% in the Fourth Quarter , According to IDC . http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS42342317\/. Online; accessed 2017-06-07. Wearables Aren't Dead, They're Just Shifting Focus as the Market Grows 16.9% in the Fourth Quarter, According to IDC. http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS42342317\/. Online; accessed 2017-06-07."},{"key":"e_1_3_2_1_4_1","volume-title":"Cryptographic Hardware and Embedded Systems","author":"Agrawal D.","year":"2002","unstructured":"D. Agrawal , B. Archambeault , J. R. Rao , and P. Rohatgi . The EM Side-channel(s) . In Cryptographic Hardware and Embedded Systems , 2002 . D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi. The EM Side-channel(s). In Cryptographic Hardware and Embedded Systems, 2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790109"},{"key":"e_1_3_2_1_6_1","volume-title":"Keyboard Acoustic Emanations","author":"Asonov D.","year":"2004","unstructured":"D. Asonov and R. Agrawal . Keyboard Acoustic Emanations . In IEEE S &P, 2004 . D. Asonov and R. Agrawal. Keyboard Acoustic Emanations. In IEEE S&P, 2004."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.20"},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Security","author":"Backes M.","year":"2010","unstructured":"M. Backes , M. D\u00fcrmuth , S. Gerling , M. Pinkal , and C. Sporleder . Acoustic Side-Channel Attacks on Printers . In USENIX Security , 2010 . M. Backes, M. D\u00fcrmuth, S. Gerling, M. Pinkal, and C. Sporleder. Acoustic Side-Channel Attacks on Printers. In USENIX Security, 2010."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.25"},{"key":"e_1_3_2_1_10_1","volume-title":"Black Hat USA","author":"Barisani A.","year":"2009","unstructured":"A. Barisani and D. Bianco . Sniffing Keystrokes with Lasers\/Voltmeters . Black Hat USA , 2009 . A. Barisani and D. Bianco. Sniffing Keystrokes with Lasers\/Voltmeters. Black Hat USA, 2009."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193208"},{"key":"e_1_3_2_1_14_1","volume-title":"HotSec","author":"Cai L.","year":"2011","unstructured":"L. Cai and H. Chen . Touchlogger: Inferring keystrokes on touch screen from smartphone motion . In HotSec , 2011 . L. Cai and H. Chen. Touchlogger: Inferring keystrokes on touch screen from smartphone motion. In HotSec, 2011."},{"key":"e_1_3_2_1_15_1","volume-title":"BlurSense: Dynamic Fine-Grained Access Control for Smartphone Privacy. In IEEE Sensors Applications Symposium","author":"Cappos J.","year":"2014","unstructured":"J. Cappos , L. Wang , R. Weiss , Y. Yang , and Y. Zhuang . BlurSense: Dynamic Fine-Grained Access Control for Smartphone Privacy. In IEEE Sensors Applications Symposium , 2014 . J. Cappos, L. Wang, R. Weiss, Y. Yang, and Y. Zhuang. BlurSense: Dynamic Fine-Grained Access Control for Smartphone Privacy. In IEEE Sensors Applications Symposium, 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2017.23013"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2011.5990871"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2984464.2984483"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866395"},{"key":"e_1_3_2_1_20_1","volume-title":"IEEE COMSNETS","author":"Han J.","year":"2012","unstructured":"J. Han , E. Owusu , L. T. Nguyen , A. Perrig , and J. Zhang . Accomplice: Location inference using accelerometers on smartphones . In IEEE COMSNETS , 2012 . J. Han, E. Owusu, L. T. Nguyen, A. Perrig, and J. Zhang. Accomplice: Location inference using accelerometers on smartphones. In IEEE COMSNETS, 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660292"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821650.2821665"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978323"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980147.2980150"},{"key":"e_1_3_2_1_25_1","volume-title":"Hacking at Random","author":"Huebler M.","year":"2009","unstructured":"M. Huebler . The New Master Lock Speed Dial\/ONE Combination Padlock - An Inside View . In Hacking at Random , 2009 . M. Huebler. The New Master Lock Speed Dial\/ONE Combination Padlock - An Inside View. In Hacking at Random, 2009."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524544"},{"key":"e_1_3_2_1_27_1","volume-title":"Optical Time-Domain Eavesdropping Risks of CRT Displays","author":"Kuhn M. G.","year":"2002","unstructured":"M. G. Kuhn . Optical Time-Domain Eavesdropping Risks of CRT Displays . In IEEE S &P, 2002 . M. G. Kuhn. Optical Time-Domain Eavesdropping Risks of CRT Displays. In IEEE S&P, 2002."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978397"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.01.020"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813668"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897905"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2802083.2808397"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Security","author":"Michalevsky Y.","year":"2014","unstructured":"Y. Michalevsky , D. Boneh , and G. Nakibly . Gyrophone: Recognizing Speech from Gyroscope Signals . In USENIX Security , 2014 . Y. Michalevsky, D. Boneh, and G. Nakibly. Gyrophone: Recognizing Speech from Gyroscope Signals. In USENIX Security, 2014."},{"key":"e_1_3_2_1_35_1","first-page":"785","volume-title":"USENIX Security Symposium","author":"Michalevsky Y.","year":"2015","unstructured":"Y. Michalevsky , A. Schulman , G. A. Veerapandian , D. Boneh , and G. Nakibly . Powerspy: Location tracking using mobile device power analysis . In USENIX Security Symposium , pages 785 -- 800 , 2015 . Y. Michalevsky, A. Schulman, G. A. Veerapandian, D. Boneh, and G. Nakibly. Powerspy: Location tracking using mobile device power analysis. In USENIX Security Symposium, pages 785--800, 2015."},{"key":"e_1_3_2_1_36_1","volume-title":"Biomechanics of Diarthrodial Joints","author":"Mow V. C.","year":"2012","unstructured":"V. C. Mow , A. Ratcliffe , and S. L. Woo . Biomechanics of Diarthrodial Joints , volume 1 . Springer Science & Business Media , 2012 . V. C. Mow, A. Ratcliffe, and S. L. Woo. Biomechanics of Diarthrodial Joints, volume 1. Springer Science & Business Media, 2012."},{"key":"e_1_3_2_1_37_1","volume-title":"Inferring user routes and locations using zero-permission mobile sensors","author":"Narain S.","year":"2016","unstructured":"S. Narain , T. D. Vo-Huu , K. Block , and G. Noubir . Inferring user routes and locations using zero-permission mobile sensors . In IEEE S &P, 2016 . S. Narain, T. D. Vo-Huu, K. Block, and G. Noubir. Inferring user routes and locations using zero-permission mobile sensors. In IEEE S&P, 2016."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-14274-6","volume-title":"Smartphone-Based Human Activity Recognition","author":"Ortiz R.","year":"2015","unstructured":"R. Ortiz and J. Luis . Smartphone-Based Human Activity Recognition . Springer Theses , 2015 . R. Ortiz and J. Luis. Smartphone-Based Human Activity Recognition. Springer Theses, 2015."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_40_1","series-title":"Lecture Notes in Computer Science","volume-title":"Smart Card Programming and Security","author":"Quisquater J.-J.","year":"2001","unstructured":"J.-J. Quisquater and D. Samyde . ElectroMagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards . In Smart Card Programming and Security , Lecture Notes in Computer Science , 2001 . J.-J. Quisquater and D. Samyde. ElectroMagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards. In Smart Card Programming and Security, Lecture Notes in Computer Science, 2001."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2013.6529487"},{"key":"e_1_3_2_1_42_1","volume-title":"ISOC NDSS","author":"Schlegel R.","year":"2011","unstructured":"R. Schlegel , K. Zhang , X.-y. Zhou , M. Intwala , A. Kapadia , and X. Wang . Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones . In ISOC NDSS , 2011 . R. Schlegel, K. Zhang, X.-y. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In ISOC NDSS, 2011."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16040426"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978300"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997498"},{"key":"e_1_3_2_1_46_1","volume-title":"USENIX Security","author":"Vuagnoux M.","year":"2009","unstructured":"M. Vuagnoux and S. Pasini . Compromising Electromagnetic Emanations of Wired and Wireless Keyboards . In USENIX Security , 2009 . M. Vuagnoux and S. Pasini. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. In USENIX Security, 2009."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897847"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2015.02.006"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858466"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699350"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1139\/p66-090"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971681"},{"issue":"3","key":"e_1_3_2_1_55_1","article-title":"A Note on Interpretation of the Paired-Samples t Test","volume":"22","author":"Zimmerman D. W.","year":"1997","unstructured":"D. W. Zimmerman . Teacher's Corner : A Note on Interpretation of the Paired-Samples t Test . Journal of Educational and Behavioral Statistics , 22 ( 3 ), 1997 . D. W. Zimmerman. Teacher's Corner: A Note on Interpretation of the Paired-Samples t Test. Journal of Educational and Behavioral Statistics, 22(3), 1997.","journal-title":"Journal of Educational and Behavioral Statistics"}],"event":{"name":"WiSec '18: 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Stockholm Sweden","acronym":"WiSec '18"},"container-title":["Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3212480.3212498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T11:55:14Z","timestamp":1693742114000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3212480.3212498"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,18]]},"references-count":54,"alternative-id":["10.1145\/3212480.3212498","10.1145\/3212480"],"URL":"https:\/\/doi.org\/10.1145\/3212480.3212498","relation":{},"subject":[],"published":{"date-parts":[[2018,6,18]]},"assertion":[{"value":"2018-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}