{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T02:21:31Z","timestamp":1725848491700},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319289090"},{"type":"electronic","value":"9783319289106"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-28910-6_20","type":"book-chapter","created":{"date-parts":[[2016,1,28]],"date-time":"2016-01-28T15:49:44Z","timestamp":1453996184000},"page":"221-233","source":"Crossref","is-referenced-by-count":1,"title":["SSG: Sensor Security Guard for Android Smartphones"],"prefix":"10.1007","author":[{"given":"Bodong","family":"Li","sequence":"first","affiliation":[]},{"given":"Yuanyuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Lyu","sequence":"additional","affiliation":[]},{"given":"Juanru","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,29]]},"reference":[{"key":"20_CR1","unstructured":"Cydia substrate. \n                    http:\/\/www.cydiasubstrate.com\/"},{"key":"20_CR2","unstructured":"Nike+ running applications. \n                    http:\/\/www.nike.com\/us\/en_us\/c\/running\/nikeplus\/gps-app"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Al-Haiqi, A., Ismail, M., Nordin, R.: On the best sensor for keystrokes inference attack on android. Procedia Technology (2013)","DOI":"10.1016\/j.protcy.2013.12.285"},{"key":"20_CR4","unstructured":"Bojinov, H., Michalevsky, Y., Nakibly, G., Boneh, D.: Mobile device identification via sensor fingerprinting (2014). \n                    arXiv:1408.1416"},{"key":"20_CR5","unstructured":"Cai, L., Chen, H.: Touchlogger: inferring keystrokes on touch screen from smartphonemotion. In: 6th Proceedings of HotSec (2011)"},{"key":"20_CR6","unstructured":"Currie, D.: Shedding some light on voice authentication (2009)"},{"key":"20_CR7","unstructured":"A.\u00a0Das, N.\u00a0Borisov, and M.\u00a0Caesar.Exploring ways to mitigate sensor-based smartphone fingerprinting.arXiv preprint \n                    arXiv:1503.01874\n                    \n                  , 2015"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Dey, S., Roy, N., Xu, W., Choudhury, R.R., Nelakuditi, S.: Accelprint: imperfections of accelerometers make smartphones trackable. In: 21st Proceedings of the Network and Distributed System Security Symposium (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23059"},{"key":"20_CR9","unstructured":"Han, J., Owusu, E., Nguyen, L.T., Perrig, A., Zhang, J.: Accomplice: location inference using accelerometers on smartphones. In: 4th Proceedings of Communication Systems and Networks (COMSNETS) (2012)"},{"key":"20_CR10","unstructured":"Lee, S.-W., Mase, K.: Activity and location recognition using wearable sensors. IEEE Pervasive Comput. (2002)"},{"key":"20_CR11","unstructured":"M\u00e4ntyj\u00e4rvi, J., Lindholm, M., Vildjiounaite, E., M\u00e4kel\u00e4, S.-M., Ailisto. H.: Identifying users of portable devices from gait pattern with accelerometers. In: 30th Proceedings of Acoustics, Speech, and Signal Processing (ICASSP 2005) (2005)"},{"key":"20_CR12","unstructured":"Michalevsky, Y.,\u00a0Boneh, D.,\u00a0Nakibly, G.: Gyrophone: recognizing speech from gyroscope signals. In: 23rd Proceedings of USENIX Security Symposium. USENIX Association (2014)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Mohan, P., Padmanabhan, V.N., Ramjee, R.: Nericell: rich monitoring of road and traffic conditions using mobilesmartphones. In: 6th Proceedings of ACM Conference on Embedded Network Sensor Systems (2008)","DOI":"10.1145\/1460412.1460450"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Spreitzer, R.: Pin skimming: exploiting the ambient-light sensor in mobile devices. In: 4th Proceedings of ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (2014)","DOI":"10.1145\/2666620.2666622"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-319-15582-1_11","volume-title":"Wireless Sensor Networks","author":"H Wang","year":"2015","unstructured":"Wang, H., Lymberopoulos, D., Liu, J.: Sensor-based user authentication. In: Abdelzaher, T., Pereira, N., Tovar, E. (eds.) EWSN 2015. LNCS, vol. 8965, pp. 168\u2013185. Springer, Heidelberg (2015)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications, and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28910-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T11:55:42Z","timestamp":1559390142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28910-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319289090","9783319289106"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28910-6_20","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2016]]}}}