{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T18:06:15Z","timestamp":1775153175138,"version":"3.50.1"},"reference-count":212,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["NSF-CAREER-CNS-1453647"],"award-info":[{"award-number":["NSF-CAREER-CNS-1453647"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["NSF-CNS-1718116"],"award-info":[{"award-number":["NSF-CNS-1718116"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"Army Research Laboratory and was accomplished through Cooperative Agreement","doi-asserted-by":"publisher","award":["W911NF-13-2-0045"],"award-info":[{"award-number":["W911NF-13-2-0045"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ARL Cyber Security CRA"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/comst.2021.3064507","type":"journal-article","created":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T21:29:09Z","timestamp":1615238949000},"page":"1125-1159","source":"Crossref","is-referenced-by-count":137,"title":["A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0207-7154","authenticated-orcid":false,"given":"Amit Kumar","family":"Sikder","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Petracca","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0159-2522","authenticated-orcid":false,"given":"Hidayet","family":"Aksu","sequence":"additional","affiliation":[]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9823-3464","authenticated-orcid":false,"given":"A. Selcuk","family":"Uluagac","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","first-page":"1","article-title":"This Ain&#x2019;t your dose: Sensor spoofing attack on medical infusion pump","author":"park","year":"2016","journal-title":"Proc 10th USENIX Workshop Offensive Technol"},{"key":"ref172","first-page":"2015","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and lidar","volume":"11","author":"petit","year":"2015","journal-title":"Proc Black Hat Europe"},{"key":"ref171","first-page":"445","article-title":"Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications","author":"shin","year":"2017","journal-title":"Proc Int Conf Cryptograph Hardw Embedded Syst"},{"key":"ref174","author":"zhang","year":"2018","journal-title":"Using AI to Hack IA A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647762"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101696"},{"key":"ref175","first-page":"2631","article-title":"Light commands: Laser-based audio injection attacks on voice-controllable systems","author":"sugawara","year":"2020","journal-title":"Proc 29th USENIX Security Symp (USENIX Security)"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2018.8711321"},{"key":"ref177","first-page":"54","article-title":"Side channel attack-survey","volume":"1","author":"persial","year":"2011","journal-title":"Int J Adva Sci Res Rev"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463186"},{"key":"ref169","first-page":"1545","article-title":"Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors","author":"tu","year":"2018","journal-title":"Proc 27th USENIX Security Symp"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977423"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3301285"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IConAC.2016.7604979"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/3428026"},{"key":"ref180","first-page":"567","article-title":"EnTrust: Regulating sensor access by cooperating programs via delegation graphs","author":"petracca","year":"2019","journal-title":"Proc 28th USENIX Security Symp"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131688"},{"key":"ref184","author":"babun","year":"2018","journal-title":"IoTDots A Digital Forensics Framework for Smart Environments"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1007\/11802839_42"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ENICS.2008.11"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978344"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.47"},{"key":"ref186","first-page":"531","article-title":"FlowFence: Practical data protection for emerging iot application frameworks","author":"fernandes","year":"2016","journal-title":"Proc Usenix Security Symp"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359840"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868342"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2975654"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795336"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818005"},{"key":"ref21","author":"petracca","year":"2016","journal-title":"AWare Controlling app access to I\/ O devices on mobile platforms"},{"key":"ref24","author":"kumar","year":"2019","journal-title":"New Android Malware Apps Use Motion Sensor to Evade Detection"},{"key":"ref23","first-page":"158","article-title":"PlaceRaider: Virtual theft in physical spaces with smartphones","author":"templeman","year":"2013","journal-title":"Proc 20th Annu Netw Distrib Syst Security Symp (NDSS)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699114"},{"key":"ref25","author":"micro","year":"2019","journal-title":"Google Play Apps Drop Anubis Banking Malware Use Motion-Based Evasion Tactics"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2021.112837"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2944034"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.31"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666623"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949056"},{"key":"ref150","first-page":"1","article-title":"Accomplice: Location inference using accelerometers on smartphones","author":"han","year":"2012","journal-title":"Proc IEEE 4th Int Conf Commun Syst Netw"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212502"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"},{"key":"ref146","first-page":"35","article-title":"Power-analysis attacks on an FPGA&#x2014;First experimental results","author":"\u00f6rs","year":"2003","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43283-0_4"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162311"},{"key":"ref149","year":"2016","journal-title":"VoIPLoc Compromising Location-Privacy Via Acoustic Side-Channel Attacks"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSAO.2015.7152200"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","article-title":"A survey on trust management for Internet of Things","volume":"42","author":"yan","year":"2014","journal-title":"J Netw Comput Appl"},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2020.102779","article-title":"Security in product lifecycle of IoT devices: A survey","volume":"171","author":"yousefnezhad","year":"2020","journal-title":"J Netw Comput Appl"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2695525"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2893253"},{"key":"ref167","author":"coffed","year":"2014","journal-title":"The Threat of GPS Jamming The Risk to an Information Utility"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30619-9_27"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"ref163","first-page":"33","article-title":"Skill squatting attacks on Amazon Alexa","author":"kumar","year":"2018","journal-title":"Proc 27th USENIX Security Symp"},{"key":"ref162","first-page":"1","article-title":"Inaudible sound as a covert channel in mobile devices","author":"deshotels","year":"2014","journal-title":"Proc 8th USENIX Workshop Offensive Technol"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800477"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802686"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2018.8301744"},{"key":"ref3","first-page":"74","article-title":"The exploration in the education of professionals in applied Internet of Things engineering","author":"yu","year":"2010","journal-title":"Proc IEEE 4th Int Conf Distance Learn Educ (ICDLE)"},{"key":"ref6","author":"kanellos","year":"2016","journal-title":"152 000 smart devices every minute in 2025 Idc outlines the future of smart things"},{"key":"ref5","year":"2019","journal-title":"Smart Home"},{"key":"ref8","first-page":"881","article-title":"Rocking drones with intentional sound noise on gyroscopic sensors","author":"son","year":"2015","journal-title":"Proc Usenix Security"},{"key":"ref159","author":"anand","year":"2019","journal-title":"SpearPhone A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers"},{"key":"ref7","first-page":"397","article-title":"6thSense: A context-aware sensor-based attack detector for smart devices","author":"sikder","year":"2017","journal-title":"Proc 26th USENIX Security Symp (USENIX Security)"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00026"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.20"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444763"},{"key":"ref158","first-page":"513","article-title":"Hidden voice commands","author":"carlini","year":"2016","journal-title":"Proc 25th Usenix Security Symp"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2976075"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2969030"},{"key":"ref48","author":"newaz","year":"2020","journal-title":"A survey on security and privacy issues in modern healthcare systems Attacks and defenses"},{"key":"ref47","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2019.102481","article-title":"A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT","volume":"149","author":"sengupta","year":"2020","journal-title":"J Netw Comput Appl"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2749883"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2016.012"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.013012.00028"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2615180"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399358"},{"key":"ref72","first-page":"1687","article-title":"Sensitive information tracking in commodity IoT","author":"celik","year":"2018","journal-title":"Proc 27th USENIX Security Symp (USENIX Security)"},{"key":"ref71","first-page":"2","article-title":"ContexloT: Towards providing contextual integrity to appified IoT platforms","volume":"2","author":"jia","year":"2017","journal-title":"Proc NDSS"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref76","year":"2017","journal-title":"Overview of Sensor"},{"key":"ref77","year":"2017","journal-title":"Who Leads OS Share in Internet of Things Era?"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"ref75","year":"2015","journal-title":"Apple Developer Documentation"},{"key":"ref78","year":"2017","journal-title":"Sensor Stack"},{"key":"ref79","year":"2017","journal-title":"Introduction to the Sensor and Location Platform in Windows"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"ref62","author":"poslad","year":"2011","journal-title":"Ubiquitous Computing Smart Devices Environments and Interactions"},{"key":"ref61","author":"hamza","year":"2020","journal-title":"IoT network security Requirements threats and countermeasures"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1186\/s40327-018-0063-8"},{"key":"ref64","year":"2017","journal-title":"SmartThings Developer Documentation"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/EduCon.2013.6530261"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1002\/9780470866931"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2012.53"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2013.6529836"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2896387.2906198"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref198","first-page":"7","article-title":"How to ask for permission","volume":"12","author":"felt","year":"2012","journal-title":"HOTSEC"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2015.12"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1145\/2663761.2664223"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/CoASE.2015.7294263"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref196","author":"live","year":"2016","journal-title":"Analysis Mobile World Congress 2016 Wrap-Up"},{"key":"ref95","first-page":"80","article-title":"Detecting impersonation attacks in future wireless and mobile networks","author":"barbeau","year":"2005","journal-title":"Proc Int Workshop Secure Mobile Ad Hoc Netw Sensors"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.14400\/JDC.2016.14.10.287"},{"key":"ref190","article-title":"Context-aware intrusion detection method for smart devices with sensors","author":"sikder","year":"2019"},{"key":"ref93","author":"maiti","year":"2018","journal-title":"[1808 07814] Light Ears Information Leakage via Smart Lights"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.01.009"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2906165"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664245"},{"key":"ref91","author":"celik","year":"2018","journal-title":"A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2794984"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627417"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/IconSpace.2013.6599495"},{"key":"ref97","year":"2019","journal-title":"Common vulnerability scoring system version 3 1 Specification document"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.013"},{"key":"ref81","year":"2017","journal-title":"Core Motion"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"ref80","year":"2017","journal-title":"SENSORS"},{"key":"ref89","first-page":"1053","article-title":"Gyrophone: Recognizing speech from gyroscope signals","author":"michalevsky","year":"2014","journal-title":"Proc Usenix Security Symp"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399421"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0087-4"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516770"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.5614\/itbj.ict.res.appl.2013.7.2.2"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_16"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666622"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/SNAMS.2019.8931716"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2974941"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863945"},{"key":"ref201","doi-asserted-by":"crossref","first-page":"145","DOI":"10.2478\/popets-2021-0009","article-title":"Real-time analysis of privacy-(un) aware IoT applications","author":"babun","year":"2021","journal-title":"Proc Privacy Enhanc Technol"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.008"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761889"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1145\/3355300"},{"key":"ref205","first-page":"1043","article-title":"Wsn integrated authentication schemes based on Internet of Things","volume":"19","author":"lin","year":"2018","journal-title":"J Internet Technol"},{"key":"ref206","author":"hartung","year":"2005","journal-title":"Node Compromise in Sensor Networks The Need for Secure Systems"},{"key":"ref211","author":"newaz","year":"2020","journal-title":"Adversarial attacks to machine learning-based smart healthcare systems"},{"key":"ref210","article-title":"Towards enhancing Web application security using trusted execution","author":"namiluko","year":"2013","journal-title":"Proc WASH"},{"key":"ref212","year":"2018","journal-title":"Security for Android Developers"},{"key":"ref127","first-page":"307","article-title":"Acoustic side-channel attacks on printers","author":"backes","year":"2010","journal-title":"Proc Usenix Security Symp"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2960778"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966263"},{"key":"ref124","author":"shumailov","year":"2019","journal-title":"Hearing your touch A new acoustic side channel on smartphones"},{"key":"ref129","author":"chhetri","year":"2016","journal-title":"Poster Exploiting Acoustic Side-Channel for Attack on Additive Manufacturing Systems"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660296"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978300"},{"key":"ref133","article-title":"Side channels enabled by smartphone interaction","author":"aviv","year":"2012"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732205"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660360"},{"key":"ref136","first-page":"1","article-title":"Compromising electromagnetic emanations of wired and wireless keyboards","author":"vuagnoux","year":"2009","journal-title":"Proc Usenix Security Symp"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2934690"},{"key":"ref138","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/978-3-662-47854-7_30","article-title":"Hard drive side-channel attacks using smartphone magnetic field sensors","author":"biedermann","year":"2015","journal-title":"Proc Int Conf Financial Cryptography Data Security"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258268"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.101106"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358650"},{"key":"ref141","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","article-title":"Electromagnetic analysis (EMA): Measures and counter-measures for smart cards","author":"quisquater","year":"2001","journal-title":"Proc Smart Card Program Security"},{"key":"ref142","first-page":"145","article-title":"Electromagnetic side channels of an FPGA implementation of AES","author":"carlier","year":"2004","journal-title":"Cryptology-eprint-archive"},{"key":"ref143","first-page":"29","article-title":"Theem side&#x2014;Channel (s)","author":"agrawal","year":"2002","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5560598"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC.2013.6676458"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMGEO.2013.8"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329817"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.29"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"ref106","author":"lin","year":"2009","journal-title":"Motion-Based Side-Channel Attack on Mobile Keystrokes"},{"key":"ref105","first-page":"9","article-title":"TouchLogger: Inferring keystrokes on touch screen from smartphone motion","volume":"11","author":"cai","year":"2011","journal-title":"Proc HotSec"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00042"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420957"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2019.2902866"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700349"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2917659"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2850313"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654855"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484373"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319722"},{"key":"ref13","first-page":"17","article-title":"SoundComber: A stealthy and context-aware sound trojan for smartphones","volume":"11","author":"schlegel","year":"2011","journal-title":"Proc NDSS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2802083.2808397"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0712"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212498"},{"key":"ref17","year":"2017","journal-title":"MEMs Accelerometer Hardware Design Flaws (Update A)"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802674"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997498"},{"key":"ref19","first-page":"379","article-title":"AWare: Preventing abuse of privacy-sensitive sensors via operation bindings","author":"petracca","year":"2017","journal-title":"Proc 26th USENIX Security Symp (USENIX Security)"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"ref114","first-page":"1243","article-title":"A new effective wearable hand gesture recognition algorithm with 3-axis accelerometer","author":"ji","year":"2015","journal-title":"Proc IEEE 12th Int Conf Fuzzy Syst Knowl Disc (FSKD)"},{"key":"ref113","article-title":"I know what you type on your phone: Keystroke inference on Android device using deep learning","author":"bo","year":"2019"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368569"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813668"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414509"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866395"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737591"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/9739\/9438976\/9372295-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9438976\/09372295.pdf?arnumber=9372295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:27Z","timestamp":1652194347000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9372295\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":212,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/comst.2021.3064507","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}