{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:20Z","timestamp":1725889880566},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_4","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T15:29:56Z","timestamp":1497367796000},"page":"63-81","source":"Crossref","is-referenced-by-count":0,"title":["Secure Keyboards Against Motion Based Keystroke Inference Attack"],"prefix":"10.1007","author":[{"given":"Shaoyong","family":"Du","sequence":"first","affiliation":[]},{"given":"Yue","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jingyu","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1016\/j.protcy.2013.12.285","volume":"11","author":"A Al-Haiqi","year":"2013","unstructured":"Al-Haiqi, A., Ismail, M., Nordin, R.: On the best sensor for keystrokes inference attack on android. Procedia Technol. 11, 989\u2013995 (2013)","journal-title":"Procedia Technol."},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Aviv, A.J., Sapp, B., Blaze, M., Smith, J.M.: Practicality of accelerometer side channels on smartphones. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 41\u201350. ACM (2012)","DOI":"10.1145\/2420950.2420957"},{"key":"4_CR3","unstructured":"Bugiel, S., Heuser, S., Sadeghi, A.R.: Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In: Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 2013), pp. 131\u2013146 (2013)"},{"key":"4_CR4","first-page":"9","volume":"11","author":"L Cai","year":"2011","unstructured":"Cai, L., Chen, H.: Touchlogger: inferring keystrokes on touch screen from smartphone motion. HotSec 11, 9\u20139 (2011)","journal-title":"HotSec"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-30921-2_16","volume-title":"Trust and Trustworthy Computing","author":"L Cai","year":"2012","unstructured":"Cai, L., Chen, H.: On the practicality of motion based keystroke inference attack. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 273\u2013290. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-30921-2_16"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Cappos, J., Wang, L., Weiss, R., Yang, Y., Zhuang, Y.: Blursense: dynamic fine-grained access control for smartphone privacy. In: 2014 IEEE Sensors Applications Symposium (SAS), pp. 329\u2013332. IEEE (2014)","DOI":"10.1109\/SAS.2014.6798970"},{"key":"4_CR7","unstructured":"Chakraborty, S., Shen, C., Raghavan, K.R., Shoukry, Y., Millar, M., Srivastava, M.: ipShield: a framework for enforcing context-aware privacy. In: 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2014), pp. 143\u2013156 (2014)"},{"key":"4_CR8","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.cose.2012.10.002","volume":"32","author":"D Damopoulos","year":"2013","unstructured":"Damopoulos, D., Kambourakis, G., Gritzalis, S.: From keyloggers to touchloggers: take the rough with the smooth. Comput. Secur. 32, 102\u2013114 (2013)","journal-title":"Comput. Secur."},{"key":"4_CR9","unstructured":"Fiebig, T., Krissler, J., H\u00e4nsch, R.: Security impact of high resolution smartphone cameras. In: 8th USENIX Workshop on Offensive Technologies (WOOT 2014) (2014)"},{"issue":"1","key":"4_CR10","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/TCE.2014.6780931","volume":"60","author":"T Kwon","year":"2014","unstructured":"Kwon, T., Na, S., Park, S.H.: Drag-and-type: a new method for typing with virtual keyboards on small touchscreens. IEEE Trans. Consum. Electron. 60(1), 99\u2013106 (2014)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Li, W., Ma, M., Han, J., Xia, Y., Zang, B., Chu, C.K., Li, T.: Building trusted path on untrusted device drivers for mobile devices. In: Proceedings of 5th Asia-Pacific Workshop on Systems, p. 8. ACM (2014)","DOI":"10.1145\/2637166.2637225"},{"key":"4_CR12","unstructured":"Michalevsky, Y., Boneh, D., Nakibly, G.: Gyrophone: recognizing speech from gyroscope signals. In: 23rd USENIX Security Symposium (USENIX Security 2014), pp. 1053\u20131067 (2014)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Miettinen, M., Heuser, S., Kronz, W., Sadeghi, A.R., Asokan, N.: Conxsense: automated context classification for context-aware access control. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 293\u2013304. ACM (2014)","DOI":"10.1145\/2590296.2590337"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: Tapprints: your finger taps have fingerprints. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323\u2013336. ACM (2012)","DOI":"10.1145\/2307636.2307666"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Na, S., Kwon, T.: Rik: a virtual keyboard resilient to spyware in smartphones. In: IEEE International Conference on Consumer Electronics (ICCE), pp. 10\u201313 (2014)","DOI":"10.1109\/ICCE.2014.6775891"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Narain, S., Sanatinia, A., Noubir, G.: Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, pp. 201\u2013212. ACM (2014)","DOI":"10.1145\/2627393.2627417"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Owusu, E., Han, J., Das, S., Perrig, A., Zhang, J.: Accessory: password inference using accelerometers on smartphones. In: Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, p. 9. ACM (2012)","DOI":"10.1145\/2162081.2162095"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Raghavan, K.R., Chakraborty, S., Srivastava, M., Teague, H.: Override: a mobile privacy framework for context-driven perturbation and synthesis of sensor data streams. In: Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones, p. 2. ACM (2012)","DOI":"10.1145\/2389148.2389150"},{"key":"4_CR19","unstructured":"Schlegel, R., Zhang, K., Zhou, X.Y., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: a stealthy and context-aware sound Trojan for smartphones. In: NDSS, vol. 11, pp. 17\u201333 (2011)"},{"key":"4_CR20","unstructured":"Song, Y., Kukreti, M., Rawat, R., Hengartner, U.: Two novel defenses against motion-based keystroke inference attacks. arXiv preprint arXiv:1410.7746 (2014)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Spreitzer, R.: Pin skimming: exploiting the ambient-light sensor in mobile devices. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, pp. 51\u201362. ACM (2014)","DOI":"10.1145\/2666620.2666622"},{"key":"4_CR22","unstructured":"Tong, T., Evans, D.: Guardroid: a trusted path for password entry. In: Proceedings of Mobile Security Technologies (MoST) (2013)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Xu, Z., Bai, K., Zhu, S.: Taplogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 113\u2013124. ACM (2012)","DOI":"10.1145\/2185448.2185465"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Xu, Z., Zhu, S.: Semadroid: a privacy-aware sensor management framework for smartphones. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 61\u201372. ACM (2015)","DOI":"10.1145\/2699026.2699114"},{"key":"4_CR25","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.cose.2014.10.008","volume":"48","author":"Q Yan","year":"2015","unstructured":"Yan, Q., Han, J., Li, Y., Zhou, J., Deng, R.H.: Leakage-resilient password entry: challenges, design, and evaluation. Comput. Secur. 48, 196\u2013211 (2015)","journal-title":"Comput. Secur."},{"key":"4_CR26","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-41674-3_4","volume-title":"Advances in Computer Science and its Applications","author":"H Yi","year":"2014","unstructured":"Yi, H., Piao, Y., Yi, J.H.: Touch logger resistant mobile authentication scheme using multimodal sensors. In: Jeong, H.Y., S. Obaidat, M., Yen, N.Y., Park, S.H. (eds.) CSA 2013. LNEE, vol. 279, pp. 19\u201326. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-41674-3_4"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Yue, Q., Ling, Z., Liu, B., Fu, X., Zhao, W.: Blind recognition of touched keys: attack and countermeasures. arXiv preprint arXiv:1403.4829 (2014)","DOI":"10.1145\/2660267.2660288"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T01:01:05Z","timestamp":1569459665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}