{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:24:45Z","timestamp":1750501485735},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319785554"},{"type":"electronic","value":"9783319785561"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78556-1_18","type":"book-chapter","created":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T20:59:59Z","timestamp":1521579599000},"page":"327-338","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Evaluating the Impact of Juice Filming Charging Attack in Practical Environments"],"prefix":"10.1007","author":[{"given":"Weizhi","family":"Meng","sequence":"first","affiliation":[]},{"given":"Wang Hao","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,21]]},"reference":[{"key":"18_CR1","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT), pp. 1\u20137. USENIX Association, Berkeley (2010)"},{"issue":"4","key":"18_CR2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MPRV.2004.21","volume":"3","author":"D Dagon","year":"2004","unstructured":"Dagon, D., Martin, T., Starner, T.: Mobile phones as computing devices: the viruses are coming!. IEEE Pervasive Comput. 3(4), 11\u201315 (2004)","journal-title":"IEEE Pervasive Comput."},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it\u2019s you! Implicit authentication based on touch screen patterns. In: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI), pp. 987\u2013996. ACM, New York (2012)","DOI":"10.1145\/2207676.2208544"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Feng, T., Liu, Z., Kwon, K.-A., Shi, W., Carbunary, B., Jiang, Y., Nguyen, N.: Continuous mobile authentication using touchscreen gestures. In: Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 451\u2013456. IEEE, USA (2012)","DOI":"10.1109\/THS.2012.6459891"},{"issue":"1","key":"18_CR5","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136\u2013148 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR6","unstructured":"IDC: Smartphone Momentum Still Evident with Shipments Expected to Reach 1.2 Billion in 2014 and Growing 23.1% Over 2013. http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24857114"},{"key":"18_CR7","unstructured":"Juice Jacking Vulnerability for iOS. https:\/\/www.infotransec.com\/news\/juice-jacking-vulnerability-ios"},{"key":"18_CR8","unstructured":"Lau, B., Jang, Y., Song, C.: Mactans: injecting malware into iOS devices via malicious chargers. Blackhat, USA (2013)"},{"key":"18_CR9","unstructured":"Li, L., Zhao, X., Xue, G.: Unobservable re-authentication for smartphones. In: Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS), pp. 1\u201316 (2013)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Li, W., Meng, W.: An empirical study on email classification using supervised machine learning in real environments. In: Proceedings of the 2015 IEEE International Conference on Communications (ICC), pp. 7438\u20137443. IEEE, (2015)","DOI":"10.1109\/ICC.2015.7249515"},{"key":"18_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-642-38519-3_21","volume-title":"Information Security and Cryptology","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Wong, D.S., Schlegel, R., Kwok, L.: Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: Kuty\u0142owski, M., Yung, M. (eds.) Inscrypt 2012. LNCS, vol. 7763, pp. 331\u2013350. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38519-3_21"},{"key":"18_CR12","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-39218-4_5","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Li, W., Kwok, L.-F.: Enhancing click-draw based graphical passwords using multi-touch on mobile phones. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 55\u201368. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39218-4_5"},{"key":"18_CR13","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.cose.2014.02.006","volume":"43","author":"W Meng","year":"2014","unstructured":"Meng, W., Li, W., Kwok, L.F.: EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43, 189\u2013204 (2014)","journal-title":"Comput. Secur."},{"issue":"3","key":"18_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/COMST.2014.2386915","volume":"17","author":"W Meng","year":"2015","unstructured":"Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutor. 17(3), 1\u201310 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Meng, W., Lee, W.H., Murali, S.R., Krishnan, S.P.T.: Charging me and I know your secrets! Towards juice filming attacks on smartphones. In: Proceedings of the Cyber-Physical System Security Workshop (CPSS), in Conjunction with AsiaCCS 2015. ACM (2015)","DOI":"10.1145\/2732198.2732205"},{"key":"18_CR16","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.jnca.2016.04.015","volume":"68","author":"W Meng","year":"2016","unstructured":"Meng, W., Lee, W.H., Murali, S.R., Krishnan, S.P.T.: JuiceCaster: towards automatic juice filming attacks on smartphones. J. Netw. Comput. Appl. 68, 201\u2013212 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"18_CR17","unstructured":"Meng, W., Lee, W.H., Krishnan, S.P.T.: A framework for large-scale collection of information from smartphone users based on juice filming attacks. In: Proceedings of the Singapore Cyber Security R&D Conference (SG-CRC), pp. 99\u2013106, January 2016"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Meng, W., Fei, F., Li, W., Au, M.H.: Harvesting Smartphone Privacy through Enhanced Juice Filming Charging Attacks. In: Proceedings of the 20th Information Security Conference (ISC) (2017)","DOI":"10.1007\/978-3-319-69659-1_16"},{"key":"18_CR19","doi-asserted-by":"publisher","unstructured":"Meng, W., Jiang, L., Wang, Y., Li, J., Zhang, J., Xiang, Y.: JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones. Comput. Secur. 13 p. (2018, in press). https:\/\/doi.org\/10.1016\/j.cose.2017.11.012","DOI":"10.1016\/j.cose.2017.11.012"},{"key":"18_CR20","unstructured":"Ossmann, M., Osborn, K.: Multiplexed Wired Attack Surfaces. Black Hat USA (2013). https:\/\/media.blackhat.com\/us-13\/US-13-Ossmann-Multiplexed-Wired-Attack-Surfaces-WP.pdf"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Raguram, R., White, A.M., Goswami, D., Monrose, F., Frahm, J.-M.: iSpy: automatic reconstruction of typed input from compromising reflections. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), pp. 527\u2013536. ACM, New York (2011)","DOI":"10.1145\/2046707.2046769"},{"issue":"4","key":"18_CR22","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1109\/TIFS.2014.2302582","volume":"9","author":"N Sae-Bae","year":"2014","unstructured":"Sae-Bae, N., Memon, N., Isbister, K., Ahmed, K.: Multitouch gesture-based authentication. IEEE Trans. Inf. Forensics Secur. 9(4), 568\u2013582 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-319-61204-1_5","volume-title":"Applied Cryptography and Network Security","author":"R Spolaor","year":"2017","unstructured":"Spolaor, R., Abudahi, L., Moonsamy, V., Conti, M., Poovendran, R.: No free charge theorem: a covert channel via\u00a0USB charging cable on mobile devices. In: Gollmann, D., Miyaji, A., Kikuchi, H. (eds.) ACNS 2017. LNCS, vol. 10355, pp. 83\u2013102. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61204-1_5"},{"key":"18_CR24","unstructured":"Singapore Power to provide 200 free mobile phone charging stations for SG50 (2015). http:\/\/www.straitstimes.com\/singapore\/singapore-power-to-provide-200-free-mobile-phone-charging-stations-for-sg50"},{"key":"18_CR25","unstructured":"The Original USB Condom. http:\/\/int3.cc\/products\/usbcondoms"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Xu, N., Zhang, F., Luo, Y., Jia, W., Xuan, D., Teng, J.: Stealthy video capturer: a new video-based spyware in 3G smartphones. In: Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec), pp. 69\u201378. ACM, New York (2009)","DOI":"10.1145\/1514274.1514285"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Xia, P., Luo, J., Ling, Z., Liu, B., Fu, X.: Fingerprint attack against touch-enabled devices. In: Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp. 57\u201368. ACM, New York (2012)","DOI":"10.1145\/2381934.2381947"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78556-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T05:38:07Z","timestamp":1570945087000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78556-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319785554","9783319785561"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78556-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}