{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T21:04:26Z","timestamp":1772053466316,"version":"3.50.1"},"reference-count":83,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsac67867.2025.00055","type":"proceedings-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T20:54:58Z","timestamp":1771966498000},"page":"583-597","source":"Crossref","is-referenced-by-count":0,"title":["Invisible Ears at Your Fingertips: Acoustic Eavesdropping via Mouse Sensors"],"prefix":"10.1109","author":[{"given":"Mohamad Habib","family":"Fakih","sequence":"first","affiliation":[{"name":"University of California,Dept. of Electrical Engineering and Computer Science,Irvine,CA,USA"}]},{"given":"Rahul","family":"Dharmaji","sequence":"additional","affiliation":[{"name":"University of California,Dept. of Electrical Engineering and Computer Science,Irvine,CA,USA"}]},{"given":"Youssef","family":"Mahmoud","sequence":"additional","affiliation":[{"name":"University of California,Dept. of Electrical Engineering and Computer Science,Irvine,CA,USA"}]},{"given":"Halima","family":"Bouzidi","sequence":"additional","affiliation":[{"name":"University of California,Dept. of Electrical Engineering and Computer Science,Irvine,CA,USA"}]},{"given":"Mohammad Abdullah","family":"Al Faruque","sequence":"additional","affiliation":[{"name":"University of California,Dept. of Electrical Engineering and Computer Science,Irvine,CA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/OZCHI.1998.732212"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2023.3264787"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466183"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NetCIT54147.2021.00041"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SER-IP52554.2021.00013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2005.1529976"},{"key":"ref7","volume-title":"Darmoshark-M3\u20134K Gaming Mouse, Darmoshark","year":"2023"},{"key":"ref8","volume-title":"Ambidextrous Esports Gaming Mouse - Razer Viper 8KHz, Razer Inc.","year":"2023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC42613.2021.9365845"},{"key":"ref10","first-page":"675","article-title":"Challenges and threats of mass telecommuting: A qualitative studyof workers","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Obada-Obieh"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660296"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"ref13","first-page":"4437","article-title":"Lend me your ear: Passive remote physical side channels on PCs","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Genkin"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3448085"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3389030"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3581791.3596837"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00008"},{"key":"ref18","first-page":"5863","article-title":"The impostor among US(B): Off-Path injection attacks on USB communications","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Dumitru"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sna.2005.09.015"},{"key":"ref20","volume-title":"Proximity detector for a seeing-eye mouse","author":"Gordon","year":"2001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MCD.2005.1438751"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/S0167-8922(04)80022-1","article-title":"6 - characterization of test specimens","volume-title":"Experimental MethodS in Tribology, ser. Tribology Series","volume":"44","author":"Stachowiak","year":"2004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-08647-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1967.5957"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1119\/1.1973431"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TG.2023.3293692"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2019.2931743"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICINIS.2015.35"},{"key":"ref30","volume-title":"LowLevelMouseProc callback function - Win32 apps 1 Microsoft Learn","year":"2023"},{"key":"ref31","article-title":"Qt: A cross-platform application framework","volume-title":"The Qt Company","year":"2024"},{"key":"ref32","volume-title":"GNOME Project, GTK: The GIMP Toolkit","year":"2024"},{"key":"ref33","volume-title":"SDL: Simple DirectMedia Layer, SDL","author":"Lantinga","year":"2024"},{"key":"ref34","article-title":"Unity game engine","volume-title":"Unity Technologies"},{"key":"ref35","article-title":"Pygame","volume-title":"The PyGame Community"},{"key":"ref36","article-title":"Unreal engine","volume-title":"Epic Games"},{"key":"ref37","first-page":"4401","article-title":"Lamphone: Passive sound recovery from a desk lamp\u2019s light bulb vibrations","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Nassi"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430781"},{"key":"ref39","first-page":"1053","article-title":"Gyrophone: Recognizing speech from gyroscope signals","volume-title":"23rd USENIXSecurity Symposium (USENIX Security 14)","author":"Michalevsky"},{"key":"ref40","article-title":"Blender - free and open 3d creation software","volume-title":"Blender Foundation","year":"2023"},{"key":"ref41","volume-title":"Kdenlive - video editing freedom","year":"2023"},{"key":"ref42","volume-title":"Krita I digital painting. creative freedom","year":"2023"},{"key":"ref43","article-title":"In-depth analysis on valorant\u2019s guarded regions","volume-title":"Xyrem","year":"2023"},{"key":"ref44","volume-title":"Openblok: A customizable, cross platform, open-source falling block game, packed with a bunch of features","author":"Mustoha","year":"2023"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5594\/J12911"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1949.232969"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1121\/1.4714351"},{"key":"ref48","article-title":"The speech banana","volume-title":"New Jersey Speech-Language-Hearing Association","year":"2021"},{"key":"ref49","volume-title":"PixArt Imaging Inc. - PAW3399DM-T4QU","year":"2023"},{"key":"ref50","volume-title":"PixArt Imaging Inc. - PAW3395DM-T6QU","year":"2023"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/78.869037"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2946.001.0001"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2005.860851"},{"key":"ref54","article-title":"Robust speech recogntion via large-scale weak supervision","volume-title":"inProceedings of the 40th International Conference on Machine Learning, ser. ICML\u201923. JMLR.org","author":"Radford","year":"2023"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref56","article-title":"Sequence to sequence learning with neural networks","volume-title":"Advancesin Neural Information Processing Systems","volume":"27","author":"Sutskever","year":"2014"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1986.1169304"},{"key":"ref58","article-title":"wav2vec 2.0: A framework for self-supervised learning of speech representations","author":"Baevski","year":"2020","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"ref59","first-page":"15","article-title":"Cstr vctk corpus: English multi-speaker corpus for cstr voice cloningtoolkit","volume":"6","author":"Veaux","year":"2017","journal-title":"University of Edinburgh. The Centre for Speech Technology Research (CSTR)"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2023.11.038"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2114881"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941023"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2006.872621"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2601097.2601119"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229095"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9224-2"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538921"},{"key":"ref68","first-page":"1053","article-title":"Gyrophone: Recognizing speech from gyroscope signals","volume-title":"23rd USENIXSecurity Symposium (USENIX Security 14)","author":"Michalevsky"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24076"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001108"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796940"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560682"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3560834.3563833"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329832"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM55648.2025.11044584"},{"key":"ref77","volume-title":"udev(7) Linux User Manual","year":"2023"},{"key":"ref78","volume-title":"The CMU Pronouncing Dictionary","year":"2023"},{"key":"ref79","volume-title":"Cmloegcmluin, Relative Frequencies of English Phonemes","year":"2012"},{"key":"ref80","volume-title":"BNC database and word frequency lists","year":"2023"},{"key":"ref81","volume-title":"Sounds of Speech - ToolsforSchools-Sounds-of-Speech-Flyer.pdf","year":"2020"},{"key":"ref82","article-title":"Razer reports full year 2021 earnings","volume-title":"Razer, Inc.","year":"2023"},{"key":"ref83","article-title":"Companies in the computer mouse market are introducing the biometric mouse to improve data security and user privacy as per the business research company\u2019s mouse global market report 2022","volume-title":"TBRC Business Research PVT LTD","year":"2022"}],"event":{"name":"2025 IEEE Annual Computer Security Applications Conference (ACSAC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["2025 IEEE Annual Computer Security Applications Conference (ACSAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11391636\/11391706\/11391848.pdf?arnumber=11391848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T20:53:52Z","timestamp":1772052832000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11391848\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":83,"URL":"https:\/\/doi.org\/10.1109\/acsac67867.2025.00055","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}