{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:44:26Z","timestamp":1740102266668,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607203","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"164-178","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4079-7846","authenticated-orcid":false,"given":"Connor","family":"Bolton","sequence":"first","affiliation":[{"name":"University of Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3429-7127","authenticated-orcid":false,"given":"Yan","family":"Long","sequence":"additional","affiliation":[{"name":"University of Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0798-704X","authenticated-orcid":false,"given":"Jun","family":"Han","sequence":"additional","affiliation":[{"name":"Yonsei University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1680-085X","authenticated-orcid":false,"given":"Josiah","family":"Hester","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5770-6421","authenticated-orcid":false,"given":"Kevin","family":"Fu","sequence":"additional","affiliation":[{"name":"Northeastern University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers. arXiv preprint arXiv:1907.05972","author":"Anand S\u00a0Abhishek","year":"2019","unstructured":"S\u00a0Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, and Yingying Chen. 2019. Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers. arXiv preprint arXiv:1907.05972 (2019)."},{"key":"e_1_3_2_1_2_1","unstructured":"Zhongjie Ba Tianhang Zheng Xinyu Zhang Zhan Qin Baochun Li Xue Liu and Kui Ren. 2020. Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.. In NDSS."},{"volume-title":"MEMS mechanical sensors","author":"Beeby Stephen","key":"e_1_3_2_1_3_1","unstructured":"Stephen Beeby, Graham Ensel, Neil\u00a0M White, and Michael Kraft. 2004. MEMS mechanical sensors. Artech House."},{"key":"e_1_3_2_1_4_1","volume-title":"Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416","author":"Bojinov Hristo","year":"2014","unstructured":"Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416 (2014)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00050"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)IS.1943-555X.0000225"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_8_1","volume-title":"2008 6th IEEE International Conference on Industrial Informatics. IEEE, 1441\u20131446","author":"Cho Yun\u00a0Chan","year":"2008","unstructured":"Yun\u00a0Chan Cho and Jae\u00a0Wook Jeon. 2008. Remote robot control system based on DTMF of mobile phone. In 2008 6th IEEE International Conference on Industrial Informatics. IEEE, 1441\u20131446."},{"key":"e_1_3_2_1_9_1","unstructured":"Android Developers. 2023. Android Debug Bridge. https:\/\/developer.android.com\/studio\/command-line\/adb."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 34th IEEE Symposium on Security and Privacy (SP). IEEE, 145\u2013159","author":"Foo\u00a0Kune Denis","year":"2013","unstructured":"Denis Foo\u00a0Kune, John Backes, Shane\u00a0S Clark, Daniel Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. 2013. Ghost talk: Mitigating EMI signal injection attacks against analog sensors. In Proceedings of the 34th IEEE Symposium on Security and Privacy (SP). IEEE, 145\u2013159."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2016.09.005"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055031.3055088"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Jun Han Emmanuel Owusu Le\u00a0T. Nguyen Adrian Perrig and Joy Zhang. 2012. ACComplice: Location inference using accelerometers on smartphones. In Communication Systems and Networks (COMSNETS). https:\/\/doi.org\/10.1109\/COMSNETS.2012.6151305","DOI":"10.1109\/COMSNETS.2012.6151305"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833716"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.205"},{"key":"e_1_3_2_1_16_1","unstructured":"Intel. 2023. Intel NUC. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/boards-kits\/nuc.html."},{"key":"e_1_3_2_1_17_1","first-page":"13","article-title":"Digital video stabilization and rolling shutter correction using gyroscopes","volume":"1","author":"Karpenko Alexandre","year":"2011","unstructured":"Alexandre Karpenko, David Jacobs, Jongmin Baek, and Marc Levoy. 2011. Digital video stabilization and rolling shutter correction using gyroscopes. CSTR 1, 2 (2011), 13.","journal-title":"CSTR"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/s131013099"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICI-BME.2009.5417279"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/APWC-on-CSE.2016.025"},{"volume-title":"https:\/\/catalog.ldc.upenn.edu\/LDC93S10","author":"Leonard Gary","key":"e_1_3_2_1_21_1","unstructured":"R.\u00a0Gary Leonard and George\u00a0R. Doddington. 1993. TIDIGITS. https:\/\/catalog.ldc.upenn.edu\/LDC93S10."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmr.2009.04.006"},{"key":"e_1_3_2_1_23_1","volume-title":"EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers. arXiv preprint arXiv:2212.12151","author":"Mahdad Ahmed\u00a0Tanvir","year":"2022","unstructured":"Ahmed\u00a0Tanvir Mahdad, Cong Shi, Zhengkun Ye, Tianming Zhao, Yan Wang, Yingying Chen, and Nitesh Saxena. 2022. EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers. arXiv preprint arXiv:2212.12151 (2022)."},{"volume-title":"Introduction to Shannon Sampling and Interpolation Theory","author":"Marks J.","key":"e_1_3_2_1_24_1","unstructured":"Robert\u00a0J. Marks, II. 1991. Introduction to Shannon Sampling and Interpolation Theory. Springer-Verlag, Berlin, Heidelberg."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"volume-title":"Advanced communications and multimedia security","author":"Maty\u00e1\u0161 V\u00e1clav","key":"e_1_3_2_1_26_1","unstructured":"V\u00e1clav Maty\u00e1\u0161 and Zden\u011bk \u0158\u00edha. 2002. Biometric authentication\u2014security and usability. In Advanced communications and multimedia security. Springer, 227\u2013239."},{"key":"e_1_3_2_1_27_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 1053\u20131067. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/michalevsky"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.31"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/evj.13371"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28166-2_11"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1949.232969"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831199"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494969"},{"key":"e_1_3_2_1_36_1","unstructured":"General Tools. 2023. DSM403SD. https:\/\/generaltools.com\/class-1-sound-level-meter-with-excel-formatted-data-logging-sd-card."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2004.1326326"},{"key":"e_1_3_2_1_39_1","volume-title":"27th USENIX Security Symposium. 1545\u20131562","author":"Tu Yazhou","year":"2018","unstructured":"Yazhou Tu, Zhiqiang Lin, Insup Lee, and Xiali Hei. 2018. Injected and delivered: fabricating implicit control over actuation systems by spoofing inertial sensors. In 27th USENIX Security Symposium. 1545\u20131562."},{"key":"e_1_3_2_1_40_1","volume-title":"Technical Features of Push-Button Telephone Sets. General Recommendations on Telephone Switching and Signalling (25 11","author":"Union International\u00a0Telecommunication","year":"1988","unstructured":"International\u00a0Telecommunication Union. 1988. Technical Features of Push-Button Telephone Sets. General Recommendations on Telephone Switching and Signalling (25 11 1988). https:\/\/www.itu.int\/rec\/T-REC-Q.23-198811-I\/en."},{"key":"e_1_3_2_1_41_1","unstructured":"Matt Vasilogambros. 2019. Voting by phone is easy. But is it secure?https:\/\/gcn.com\/articles\/2019\/07\/18\/vote-by-phone.aspx."},{"key":"e_1_3_2_1_42_1","volume-title":"symposium, Vol.\u00a0348","author":"Whitten Alma","year":"1999","unstructured":"Alma Whitten and J\u00a0Doug Tygar. 1999. Why Johnny Can\u2019t Encrypt: A Usability Evaluation of PGP 5.0.. In USENIX security symposium, Vol.\u00a0348. 169\u2013184."},{"volume-title":"Analog and digital filter design","author":"Winder Steve","key":"e_1_3_2_1_43_1","unstructured":"Steve Winder. 2002. Analog and digital filter design. Elsevier."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354248"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742658"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381947"}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:29:40Z","timestamp":1729074580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607203"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":46,"alternative-id":["10.1145\/3607199.3607203","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607203","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}