{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:00:01Z","timestamp":1740099601918,"version":"3.37.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030324292"},{"type":"electronic","value":"9783030324308"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32430-8_17","type":"book-chapter","created":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T11:11:01Z","timestamp":1572001861000},"page":"276-296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0491-4577","authenticated-orcid":false,"given":"Kavita","family":"Kumari","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9316-1943","authenticated-orcid":false,"given":"Murtuza","family":"Jadliwala","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6461-2805","authenticated-orcid":false,"given":"Anindya","family":"Maiti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3765-7500","authenticated-orcid":false,"given":"Mohammad Hossein","family":"Manshaei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,23]]},"reference":[{"key":"17_CR1","unstructured":"Cai, L., Chen, H.: TouchLogger: inferring keystrokes on touch screen from smartphone motion. In: HotSec (2011)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Cai, L., Machiraju, S., Chen, H.: Defending against sensor-sniffing attacks on mobile phones. In: ACM MobiHeld, pp. 31\u201336 (2009)","DOI":"10.1145\/1592606.1592614"},{"issue":"2","key":"17_CR3","doi-asserted-by":"publisher","first-page":"179","DOI":"10.2307\/1885060","volume":"102","author":"IK Cho","year":"1987","unstructured":"Cho, I.K., Kreps, D.M.: Signaling games and stable equilibria. Q. J. Econ. 102(2), 179\u2013221 (1987)","journal-title":"Q. J. Econ."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: ACM CCS, pp. 627\u2013638 (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: ACM SPSM (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Gao, X., Firner, B., Sugrim, S., Kaiser-Pendergrast, V., Yang, Y., Lindqvist, J.: Elastic pathing: Your speed is enough to track you. In: ACM UbiComp (2014)","DOI":"10.1145\/2632048.2632077"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Hammad, M., Bagheri, H., Malek, S.: Determination and enforcement of least-privilege architecture in android. In: IEEE ICSA, pp. 59\u201368 (2017)","DOI":"10.1109\/ICSA.2017.18"},{"key":"17_CR8","unstructured":"Han, J., Owusu, E., Nguyen, L., Perrig, A., Zhang, J.: ACComplice: location inference using accelerometers on smartphones. In: ACM COMSNETS (2012)"},{"key":"17_CR9","unstructured":"Kumari, K., Jadliwala, M., Maiti, A.: Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach (Full Report) (2019). \n                    https:\/\/sprite.utsa.edu\/art\/defender\n                    \n                  . Accessed 30 Apr 2019"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Liu, X., Zhou, Z., Diao, W., Li, Z., Zhang, K.: When good becomes evil: keystroke inference with smartwatch. In: ACM CCS, pp. 1273\u20131285 (2015)","DOI":"10.1145\/2810103.2813668"},{"issue":"9","key":"17_CR11","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1109\/TMC.2018.2794984","volume":"17","author":"A Maiti","year":"2018","unstructured":"Maiti, A., Jadliwala, M., He, J., Bilogrevic, I.: Side-channel inference attacks on mobile keypads using smartwatches. IEEE Trans. Mob. Comput. 17(9), 2180\u20132194 (2018)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Maiti, A., Armbruster, O., Jadliwala, M., He, J.: Smartwatch-based keystroke inference attacks and context-aware protection mechanisms. In: ACM AsiaCCS (2016)","DOI":"10.1145\/2897845.2897905"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Maiti, A., Heard, R., Sabra, M., Jadliwala, M.: Towards inferring mechanical lock combinations using wrist-wearables as a side-channel. In: ACM WiSec, pp. 111\u2013122 (2018)","DOI":"10.1145\/3212480.3212498"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Marquardt, P., Verma, A., Carter, H., Traynor, P.: (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers. In: ACM CCS (2011)","DOI":"10.1145\/2046707.2046771"},{"key":"17_CR15","unstructured":"Michalevsky, Y., Boneh, D., Nakibly, G.: Gyrophone: recognizing speech from gyroscope signals. In: USENIX Security (2014)"},{"key":"17_CR16","unstructured":"Michalevsky, Y., Nakibly, G., Veerapandian, G.A., Boneh, D., Nakibly, G.: PowerSpy: location tracking using mobile device power analysis. In: USENIX Security (2015)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: TapPrints: your finger taps have fingerprints. In: ACM MobiSys (2012)","DOI":"10.1145\/2307636.2307666"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Narain, S., Vo-Huu, T.D., Block, K., Noubir, G.: Inferring user routes and locations using zero-permission mobile sensors. In: IEEE S&P (2016)","DOI":"10.1109\/SP.2016.31"},{"key":"17_CR19","unstructured":"Nguyen, L., Cheng, H., Wu, P., Buthpitiya, S., Zhang, Y.: PnLUM: system for prediction of next location for users with mobility. In: Nokia Mobile Data Challenge Workshop (2012)"},{"key":"17_CR20","volume-title":"A Course in Game Theory","author":"MJ Osborne","year":"1994","unstructured":"Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Owusu, E., Han, J., Das, S., Perrig, A., Zhang, J.: Accessory: password inference using accelerometers on smartphones. In: ACM HotMobile (2012)","DOI":"10.1145\/2162081.2162095"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Rahman, M.A., Manshaei, M.H., Al-Shaer, E.: A game-theoretic approach for deceiving remote operating system fingerprinting. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 73\u201381. IEEE (2013)","DOI":"10.1109\/CNS.2013.6682694"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Sabra, M., Maiti, A., Jadliwala, M.: Keystroke inference using ambient light sensor on wrist-wearables: a feasibility study. In: ACM WearSys (2018)","DOI":"10.1145\/3211960.3211973"},{"key":"17_CR24","unstructured":"Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A., Wang, X.: SoundComber: a stealthy and context-aware sound Trojan for smartphones. In: NDSS (2011)"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Wang, C., Guo, X., Wang, Y., Chen, Y., Liu, B.: Friend or foe?: Your wearable devices reveal your personal pin. In: ACM AsiaCCS (2016)","DOI":"10.1145\/2897845.2897847"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Wang, H., Lai, T.T.T., Roy Choudhury, R.: MoLe: motion leaks through smartwatch sensors. In: ACM MobiCom (2015)","DOI":"10.1145\/2789168.2790121"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32430-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T11:12:55Z","timestamp":1572001975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32430-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030324292","9783030324308"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32430-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stockholm","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.gamesec-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}