{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T21:29:06Z","timestamp":1771882146352,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3664214","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T21:00:51Z","timestamp":1770930051000},"page":"26899-26911","source":"Crossref","is-referenced-by-count":0,"title":["Engineering Sensor Spoofing Protection Into the Android Operating System"],"prefix":"10.1109","volume":"14","author":[{"given":"Roy","family":"Hershkovitz","sequence":"first","affiliation":[{"name":"Stein Faculty of Computer and Information Science, Ben-Gurion University of the Negev, Be&#x2019;er Sheba, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0423-802X","authenticated-orcid":false,"given":"Yossi","family":"Oren","sequence":"additional","affiliation":[{"name":"Stein Faculty of Computer and Information Science, Ben-Gurion University of the Negev, Be&#x2019;er Sheba, Israel"}]}],"member":"263","reference":[{"key":"ref1","first-page":"881","article-title":"Rocking drones with intentional sound noise on gyroscopic sensors","volume-title":"Proc. USENIX","author":"Son"},{"key":"ref2","first-page":"1545","article-title":"Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors","volume-title":"Proc. USENIX","author":"Tu"},{"key":"ref3","article-title":"Sensor-based continuous authentication of smartphones\u2019 users using behavioral biometrics: A contemporary survey","author":"Abuhamad","year":"2020","journal-title":"arXiv:2001.08578"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117362"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1115\/detc2015-47378"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103904"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2847418"},{"key":"ref9","volume-title":"Android Internals: Confectioner\u2019s Cookbook: Power Users\u2019s View","author":"Levin","year":"2015"},{"key":"ref10","volume-title":"Sensormanager","year":"2026"},{"key":"ref11","article-title":"How to phone home with someone else\u2019s phone: Information exfiltration using intentional sound noise on gyroscopic sensors","volume-title":"Proc. WOOT","author":"Farshteindiker"},{"key":"ref12","first-page":"3939","article-title":"Imaging time-series to improve classification and imputation","volume-title":"Proc. IJCAI","author":"Wang"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"ref14","article-title":"Variational autoencoder based anomaly detection using reconstruction probability","author":"An","year":"2015"},{"key":"ref15","volume-title":"Expo","year":"2026"},{"key":"ref16","volume-title":"Redmi 9: Frequently Asked Questions","year":"2025"},{"key":"ref17","volume-title":"Lineageos Android","year":"2026"},{"key":"ref18","volume-title":"Andromeda: A Collection of Android Utilities for Developers","author":"Corry","year":"2023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3560905.3568532"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_19"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1249\/mss.0000000000000285"},{"key":"ref22","first-page":"1053","article-title":"Gyrophone: Recognizing speech from gyroscope signals","volume-title":"Proc. 23rd USENIX Secur. Symp.","author":"Michalevsky"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243860"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.125811","article-title":"TBAuth: A continuous authentication framework based on tap behavior for smartphones","volume":"264","author":"Chen","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/icdew.2006.157"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330747"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1016\/j.jbi.2022.104198","article-title":"Temporal patterns selection for all-cause mortality prediction in T2D with ANNs","volume":"134","author":"Novitski","year":"2022","journal-title":"J. Biomed. Informat."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121521","article-title":"Dual-source gramian angular field method and its application on fault diagnosis of drilling pump fluid end","volume":"237","author":"Li","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref31","first-page":"27","article-title":"Aurasium: Practical policy enforcement for Android applications","volume-title":"Proc. USENIX","author":"Xu"},{"key":"ref32","first-page":"711","article-title":"Hidemyapp: Hiding the presence of sensitive apps on Android","volume-title":"Proc. USENIX Secur. Symp.","author":"Pham"},{"key":"ref33","first-page":"97","article-title":"Securing embedded user interfaces: Android and beyond","volume-title":"Proc. USENIX","author":"Roesner"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833563"},{"key":"ref35","first-page":"397","article-title":"6thSense: A context-aware sensor-based attack detector for smart devices","volume-title":"Proc. USENIX","author":"Sikder"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.129446","article-title":"CADroid: A cross-combination attention based framework for Android malware detection","volume":"297","author":"Ma","year":"2026","journal-title":"Expert Syst. Appl."},{"key":"ref37","first-page":"799","article-title":"The secure socket API: TLS as an operating system service","volume-title":"Proc. USENIX Secur. Symp.","volume":"43","author":"O\u2019Neill"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11394777.pdf?arnumber=11394777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T20:49:38Z","timestamp":1771879778000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11394777\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3664214","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}