{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:22:56Z","timestamp":1725974576231},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788128"},{"type":"electronic","value":"9783319788135"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78813-5_32","type":"book-chapter","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T06:03:21Z","timestamp":1523340201000},"page":"629-643","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cross-site Input Inference Attacks on\u00a0Mobile Web Users"],"prefix":"10.1007","author":[{"given":"Rui","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Chuan","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Aviv, A.J., Sapp, B., Blaze, M., Smith, J.M.: Practicality of accelerometer side channels on smartphones. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), pp. 41\u201350 (2012)","DOI":"10.1145\/2420950.2420957"},{"key":"32_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-30921-2_16","volume-title":"Trust and Trustworthy Computing","author":"L Cai","year":"2012","unstructured":"Cai, L., Chen, H.: On the practicality of motion based keystroke inference attack. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 273\u2013290. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-30921-2_16"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: TapPrints: your finger taps have fingerprints. In: Proceedings of the International Conference on Mobile Systems, Applications, and Services, pp. 323\u2013336 (2012)","DOI":"10.1145\/2307636.2307666"},{"key":"32_CR4","volume-title":"Introduction to Signal Processing","author":"SJ Orfanidis","year":"1995","unstructured":"Orfanidis, S.J.: Introduction to Signal Processing. Prentice-Hall Inc., Englewood Cliffs (1995)"},{"key":"32_CR5","unstructured":"Platt, J.: Sequential minimal optimization: a fast algorithm for training support vector machines. Technical report (1998)"},{"key":"32_CR6","unstructured":"Smith, S.W.: The scientist and engineer\u2019s guide to digital signal processing (1997)"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Xu, Z., Bai, K., Zhu, S.: TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. In: Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 113\u2013124 (2012)","DOI":"10.1145\/2185448.2185465"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Yue, C.: Sensor-based mobile web fingerprinting and cross-site input inference attacks. In: Proceedings of the IEEE Workshop on Mobile Security Technologies (2016)","DOI":"10.1109\/SPW.2016.17"},{"key":"32_CR9","unstructured":"Same Origin Policy. \nhttps:\/\/www.w3.org\/Security\/wiki\/Same_Origin_Policy"},{"key":"32_CR10","unstructured":"Weka 3: Data Mining Software in Java. \nhttp:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78813-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T06:21:29Z","timestamp":1523341289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78813-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788128","9783319788135"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78813-5_32","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}