{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:14:19Z","timestamp":1763507659386,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642309205"},{"type":"electronic","value":"9783642309212"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30921-2_16","type":"book-chapter","created":{"date-parts":[[2012,6,8]],"date-time":"2012-06-08T09:54:41Z","timestamp":1339149281000},"page":"273-290","source":"Crossref","is-referenced-by-count":55,"title":["On the Practicality of Motion Based Keystroke Inference Attack"],"prefix":"10.1007","author":[{"given":"Liang","family":"Cai","sequence":"first","affiliation":[]},{"given":"Hao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Keystroke logging wiki page, http:\/\/en.wikipedia.org\/wiki\/Keystroke_logging"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Asonov, D., Agrawal, R.: Keyboard acoustic emanations. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 3\u201311 (May 2004)","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"16_CR3","unstructured":"Aylward, R., Lovell, S.D., Paradiso, J.A.: A compact, wireless, wearable sensor network for interactive dance ensembles. In: International Workshop on Wearable and Implantable Body Sensor Networks, BSN 2006, pages 4, p. 70 (April 2006)"},{"key":"16_CR4","unstructured":"Cai, L., Chen, H.: Touchlogger: inferring keystrokes on touch screen from smartphone motion. In: Proceedings of the 6th USENIX Conference on Hot Topics in Security, HotSec 2011, p. 9 (2011)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Cai, L., Machiraju, S., Chen, H.: Defending against sensor-sniffing attacks on mobile phones. In: Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds, MobiHeld 2009, pp. 31\u201336 (2009)","DOI":"10.1145\/1592606.1592614"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1007\/978-3-642-17534-3_80","volume-title":"Neural Information Processing. Models and Applications","author":"B. Choe","year":"2010","unstructured":"Choe, B., Min, J.-K., Cho, S.-B.: Online Gesture Recognition for User Interface on Accelerometer Built-in Mobile Phones. In: Wong, K.W., Mendis, B.S.U., Bouzerdoum, A. (eds.) ICONIP 2010, Part II. LNCS, vol.\u00a06444, pp. 650\u2013657. Springer, Heidelberg (2010)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Chong, M.K., Marsden, G., Gellersen, H.: Gesturepin: using discrete gestures for associating mobile devices. In: Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services, MobileHCI 2010, pp. 261\u2013264 (2010)","DOI":"10.1145\/1851600.1851644"},{"key":"16_CR8","unstructured":"Kune, D.F., Kim, Y.: Timing attacks on pin input devices. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 678\u2013680 (2010)"},{"key":"16_CR9","unstructured":"Madzarov, D.G.G., Chorbev, I.: A multiclass svm classifier utilizing binary decision tree. In: Informatica33, pp. 233\u2013241 (2009)"},{"key":"16_CR10","unstructured":"Hancke, G.P.: Gesture recognition as ubiquitous input for mobile phones (2008)"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-24646-6_3","volume-title":"Pervasive Computing","author":"J. Lester","year":"2004","unstructured":"Lester, J., Hannaford, B., Borriello, G.: \u201cAre You with Me?\u201d - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol.\u00a03001, pp. 33\u201350. Springer, Heidelberg (2004)"},{"key":"16_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.pmcj.2008.09.001","volume":"5","author":"J. Liu","year":"2009","unstructured":"Liu, J., Wang, Z., Zhong, L., Wickramasuriya, J., Vasudevan, V.: uwave: Accelerometer-based personalized gesture recognition and its applications. Pervasive and Mobile Computing\u00a05, 1\u20139 (2009)","journal-title":"Pervasive and Mobile Computing"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-72037-9_9","volume-title":"Pervasive Computing","author":"R. Mayrhofer","year":"2007","unstructured":"Mayrhofer, R., Gellersen, H.-W.: Shake Well Before Use: Authentication Based on Accelerometer Data. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol.\u00a04480, pp. 144\u2013161. Springer, Heidelberg (2007)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Min, C.-H., Tewfik, A.H.: Automatic characterization and detection of behavioral patterns using linear predictive coding of accelerometer sensor data. In: Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol.\u00a02010, pp. 220\u2013223 (2010)","DOI":"10.1109\/IEMBS.2010.5627850"},{"key":"16_CR15","unstructured":"Nasiri, S., Sachs, D., Maia, M.: Selection and integration of mems-based motion processing in consumer apps (July 2009), http:\/\/invensense.com\/mems\/gyro\/documents\/whitepapers\/Selection-and-integration-of-MEMS-based-motion-processing-in-consumer-apps-070809-EE-Times.pdf"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Niu, Y., Chen, H.: Gesture authentication with touch input for mobile devices. In: 3rd International Conference on Security and Privacy in Mobile Information and Communication Systems, MobiSec 2011 (May 2011)","DOI":"10.1007\/978-3-642-30244-2_2"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Owusu, E., Han, J., Das, S., Perrig, A., Zhang, J.: Accessory: password inference using accelerometers on smartphones. In: Proceedings of the Twelfth Workshop on Mobile Computing Systems and Applications, HotMobile 2012, pp. 9:1\u20139:6. ACM, New York (2012)","DOI":"10.1145\/2162081.2162095"},{"key":"16_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-16917-5_3","volume-title":"Ambient Intelligence","author":"C. Pham","year":"2010","unstructured":"Pham, C., Pl\u00f6tz, T., Olivier, P.: A Dynamic Time Warping Approach to Real-Time Activity Recognition for Food Preparation. In: de Ruyter, B., Wichert, R., Keyson, D.V., Markopoulos, P., Streitz, N., Divitini, M., Georgantas, N., Mana Gomez, A. (eds.) AmI 2010. LNCS, vol.\u00a06439, pp. 21\u201330. Springer, Heidelberg (2010)"},{"key":"16_CR19","unstructured":"Popescu, A., Block, S.: DeviceOrientation event specification, editor\u2019s draft 9 (February 2011), http:\/\/dev.w3.org\/geo\/api\/spec-source-orientation.html"},{"key":"16_CR20","unstructured":"Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on ssh. In: Proceedings of the 10th conference on USENIX Security Symposium, vol.\u00a010, p. 25 (2001)"},{"key":"16_CR21","unstructured":"Vuagnoux, M., Pasini, S.: Compromising electromagnetic emanations of wired and wireless keyboards. In: Proceedings of the 18th Conference on USENIX Security Symposium, SSYM 2009, pp. 1\u201316 (2009)"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-02830-4_4","volume-title":"Ubiquitous Intelligence and Computing","author":"J. Wu","year":"2009","unstructured":"Wu, J., Pan, G., Zhang, D., Qi, G., Li, S.: Gesture Recognition with a 3-D Accelerometer. In: Zhang, D., Portmann, M., Tan, A.-H., Indulska, J. (eds.) UIC 2009. LNCS, vol.\u00a05585, pp. 25\u201338. Springer, Heidelberg (2009)"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Xu, N., Zhang, F., Luo, Y., Jia, W., Xuan, D., Teng, J.: Stealthy video capturer: a new video-based spyware in 3G smartphones. In: Proceedings of the Second ACM Conference on Wireless Network Security, WiSec 2009, pp. 69\u201378 (2009)","DOI":"10.1145\/1514274.1514285"},{"key":"16_CR24","unstructured":"Zhang, K., Zhou, X., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: A stealthy and context-aware sound trojan for smartphones. In: Proceedings of the 18th Annual Networkand Distributed System Security Symposium, NDSS 2011 (2011)"},{"key":"16_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1609956.1609959","volume":"13","author":"L. Zhuang","year":"2009","unstructured":"Zhuang, L., Zhou, F., Tygar, J.D.: Keyboard acoustic emanations revisited. ACM Transactions on Information and System Security\u00a013, 3:1\u20133:26 (2009)","journal-title":"ACM Transactions on Information and System Security"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30921-2_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T06:18:24Z","timestamp":1743315504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30921-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642309205","9783642309212"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30921-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}