{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T16:10:03Z","timestamp":1750954203444,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319696584"},{"type":"electronic","value":"9783319696591"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69659-1_16","type":"book-chapter","created":{"date-parts":[[2017,10,19]],"date-time":"2017-10-19T08:44:47Z","timestamp":1508402687000},"page":"291-308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks"],"prefix":"10.1007","author":[{"given":"Weizhi","family":"Meng","sequence":"first","affiliation":[]},{"given":"Fei","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Wenjuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Man Ho","family":"Au","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,20]]},"reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-319-08509-8_3","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"D Andriesse","year":"2014","unstructured":"Andriesse, D., Bos, H.: Instruction-level steganography for covert trigger-based malware. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 41\u201350. Springer, Cham (2014). doi:10.1007\/978-3-319-08509-8_3"},{"key":"16_CR2","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT), pp. 1\u20137 (2010)"},{"key":"16_CR3","unstructured":"Cai, L., Chen, H.: TouchLogger: inferring keystrokes on touch screen from smartphone motion. In: Proceedings of the 6th USENIX Conference on Hot Topics in Security (HotSec), pp. 1\u20136 (2011)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Dagon, D., Martin, T., Starner, T.: Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Comput. 3(4), 11\u201315 (2004)","DOI":"10.1109\/MPRV.2004.21"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know its you!: implicit authentication based on touch screen patterns. In: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI), pp. 987\u2013996 (2012)","DOI":"10.1145\/2207676.2208544"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Feng, T., Liu, Z., Kwon, K.-A., Shi, W., Carbunary, B., Jiang, Y., Nguyen, N.: Continuous mobile authentication using touchscreen gestures. In: Proceedings the 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 451\u2013456 (2012)","DOI":"10.1109\/THS.2012.6459891"},{"issue":"1","key":"16_CR7","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136\u2013148 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Han, J., Owusu, E., Nguyen, L., Perrig, A., Zhang, J.: ACComplice: location inference using accelerometers on smartphones. In: Proceedings of the 4th International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u20139, New York, NY, USA (2012)","DOI":"10.1109\/COMSNETS.2012.6151305"},{"key":"16_CR9","unstructured":"IDC, Smartphone Momentum Still Evident with Shipments Expected to Reach 1.2 Billion in 2014 and Growing 23.1% Over (2013), http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24857114"},{"key":"16_CR10","unstructured":"Juice Jacking Vulnerability for iOS, https:\/\/www.infotransec.com\/news\/juice-jacking-vulnerability-ios"},{"key":"16_CR11","unstructured":"Lau, B., Jang, Y., Song, C.: Mactans: Injecting malware into iOS devices via malicious chargers. Blackhat, USA (2013)"},{"key":"16_CR12","unstructured":"Li, L., Zhao, X., Xue, G.: Unobservable Re-authentication for Smartphones. In: Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS), pp. 1\u201316 (2013)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Li, W., Meng, W.: An empirical study on email classification using supervised machine learning in real environments. In: Proceddings of the 2015 IEEE International Conference on Communications (ICC), pp. 7438\u20137443. IEEE (2015)","DOI":"10.1109\/ICC.2015.7249515"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Lin, C.-C., Li, H., Zhou, X., Wang, X.: Screenmilker: how to milk your android screen for secrets. In: Proceedings of Annual Network and Distributed System Security Symposium (NDSS), pp. 1\u201310 (2014)","DOI":"10.14722\/ndss.2014.23049"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Marquardt, P., Verma, A., Carter, H., Traynor, P.: (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers. In: Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 551\u2013562. ACM, New York (2011)","DOI":"10.1145\/2046707.2046771"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-642-38519-3_21","volume-title":"Information Security and Cryptology","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Wong, D.S., Schlegel, R., Kwok, L.: Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: Kuty\u0142owski, M., Yung, M. (eds.) Inscrypt 2012. LNCS, vol. 7763, pp. 331\u2013350. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-38519-3_21"},{"key":"16_CR17","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-39218-4_5","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Li, W., Kwok, L.-F.: Enhancing click-draw based graphical passwords using multi-touch on mobile phones. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 55\u201368. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39218-4_5"},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.cose.2014.02.006","volume":"43","author":"W Meng","year":"2014","unstructured":"Meng, W., Li, W., Kwok, L.F.: EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43, 189\u2013204 (2014)","journal-title":"Comput. Secur."},{"key":"16_CR19","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","volume":"17","author":"W Meng","year":"2015","unstructured":"Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutorials 17, 1268\u20131293 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Meng, W., Lee, W.H., Murali, S.R., Krishnan, S.P.T.: Charging me and i know your secrets! towards juice filming attacks on smartphones. In: Proceedings of the Cyber-Physical System Security Workshop (CPSS), in Conjunction with AsiaCCS 2015. ACM (2015)","DOI":"10.1145\/2732198.2732205"},{"key":"16_CR21","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.jnca.2016.04.015","volume":"68","author":"W Meng","year":"2016","unstructured":"Meng, W., Lee, W.H., Murali, S.R., Krishnan, S.P.T.: JuiceCaster: towards automatic juice filming attacks on smartphones. J. Netw. Comput. Appl. 68, 201\u2013212 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: TapPrints: your finger taps have fingerprints. In: Proceedings of MobiSys, New York, NY, USA , pp. 323\u2013336 (2012)","DOI":"10.1145\/2307636.2307666"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Owusu, E., Han, J., Das, S., Perrig, A., Zhang, J.: ACCessory: password inference using accelerometers on smartphones. In: Proceedings of the 12th Workshop on Mobile Computing Systems & Applications (HotMobile), pp. 1\u20136. ACM, New York (2012)","DOI":"10.1145\/2162081.2162095"},{"key":"16_CR24","unstructured":"Ossmann, M., Osborn, K.: Multiplexed Wired Attack Surfaces. Black Hat USA (2013), https:\/\/media.blackhat.com\/us-13\/US-13-Ossmann-Multiplexed-Wired-Attack-Surfaces-WP.pdf"},{"issue":"2","key":"16_CR25","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1109\/SURV.2013.070813.00214","volume":"16","author":"S Peng","year":"2014","unstructured":"Peng, S., Yu, S., Yang, A.: Smartphone malware and its propagation modeling: a survey. IEEE Commun. Surv. Tutorials 16(2), 925\u2013941 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Raguram, R., White, A.M., Goswami, D., Monrose, F., Frahm, J.-M.: iSpy: automatic reconstruction of typed input from compromising reflections. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), pp. 527\u2013536, ACM, New York (2011)","DOI":"10.1145\/2046707.2046769"},{"issue":"4","key":"16_CR27","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1109\/TIFS.2014.2302582","volume":"9","author":"N Sae-Bae","year":"2014","unstructured":"Sae-Bae, N., Memon, N., Isbister, K., Ahmed, K.: Multitouch gesture-based authentication. IEEE Trans. Inf. Forensics Secur. 9(4), 568\u2013582 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR28","unstructured":"Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: a stealthy and context-aware sound Trojan for smartphones. In: Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, pp. 17\u201333 (2011)"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Spolaor, R., Abudahi, L., Moonsamy, V., Conti, M., Poovendran, R.: No free charge theorem: a covert channel viaUSB charging cable on mobile devices. In: Proceedings of the 15th International Conference on Applied Cryptography and Network Security (ACNS), pp. 84\u2013102 (2017)","DOI":"10.1007\/978-3-319-61204-1_5"},{"key":"16_CR30","unstructured":"Singapore Power to provide 200 free mobile phone charging stations for SG50 (2015), http:\/\/www.straitstimes.com\/singapore\/singapore-power-to-provide-200-free-mobile-phone-charging-stations-for-sg50"},{"key":"16_CR31","unstructured":"The Original USB Condom, http:\/\/int3.cc\/products\/usbcondoms"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Xing, L., Pan, X., Wang, R., Yuan, K., Wang, X.: Upgrading your android, elevating my malware: privilege escalation through mobile OS updating. In: Proceedings of the 2014 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp. 393\u2013408 (2014)","DOI":"10.1109\/SP.2014.32"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Xia, P., Luo, J., Ling, Z., Liu, B., Fu, X.: Fingerprint attack against touch-enabled devices. In: Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp. 57\u201368. ACM, New York (2012)","DOI":"10.1145\/2381934.2381947"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69659-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T15:31:50Z","timestamp":1750951910000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-69659-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319696584","9783319696591"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69659-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"20 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isc2017.vgu.edu.vn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}