{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T09:01:39Z","timestamp":1773910899515,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T00:00:00Z","timestamp":1350604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,19]]},"DOI":"10.1145\/2381934.2381947","type":"proceedings-article","created":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T13:41:01Z","timestamp":1350654061000},"page":"57-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["Fingerprint attack against touch-enabled devices"],"prefix":"10.1145","author":[{"given":"Yang","family":"Zhang","sequence":"first","affiliation":[{"name":"Southeast University, Nanjing, China"}]},{"given":"Peng","family":"Xia","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell, Lowell, MA, USA"}]},{"given":"Junzhou","family":"Luo","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, China"}]},{"given":"Zhen","family":"Ling","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, China"}]},{"given":"Benyuan","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell, Lowell, MA, USA"}]},{"given":"Xinwen","family":"Fu","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell, Lowell, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"Asonovand D.","year":"2004","unstructured":"D. Asonovand and R. Agrawal . Keyboard acoustic emanations . In Proceedings of IEEE Symposium on Security and Privacy , 2004 . D. Asonovand and R. Agrawal. Keyboard acoustic emanations. In Proceedings of IEEE Symposium on Security and Privacy, 2004."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of Workshop on Offensive Technology WOOT","author":"Aviv A. J.","year":"2010","unstructured":"A. J. Aviv , K. Gibson , E. Mossop , M. Blaze , and J. M. Smith . Smudge attacks on smartphone touch screens . In Proceedings of Workshop on Offensive Technology WOOT , 2010 . A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith. Smudge attacks on smartphone touch screens. In Proceedings of Workshop on Offensive Technology WOOT, 2010."},{"key":"e_1_3_2_1_3_1","first-page":"1176","volume":"24","author":"Bacharach S. L.","year":"1984","unstructured":"S. L. Bacharach , M. V. Green , D. Vitale , G. White , M. A. Douglas , R. . Bonow , and S. M. Larson . Optimum Fourier Filtering of Cardiac Data: A Minimum-Error Method: Concise Communication. THE JOURNAL OF NUCLEAR MEDICINE , 24 : 1176 -- 1184 , 1984 . S. L. Bacharach, M. V. Green, D. Vitale, G. White, M. A. Douglas, R. . Bonow, and S. M. Larson. Optimum Fourier Filtering of Cardiac Data: A Minimum-Error Method: Concise Communication. THE JOURNAL OF NUCLEAR MEDICINE, 24:1176--1184, 1984.","journal-title":"THE JOURNAL OF NUCLEAR MEDICINE"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.28"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.29"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 6th USENIX Workshop on Hot Topics in Security (HotSec)","author":"Cai L.","year":"2011","unstructured":"L. Cai and H. Chen . TouchLogger: Inferring keystrokes on touch screen from smartphone motion . In Proceedings of the 6th USENIX Workshop on Hot Topics in Security (HotSec) , 2011 . L. Cai and H. Chen. TouchLogger: Inferring keystrokes on touch screen from smartphone motion. In Proceedings of the 6th USENIX Workshop on Hot Topics in Security (HotSec), 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"SMPTE Journal","author":"Couzin D.","year":"1982","unstructured":"D. Couzin . Depths of Field . SMPTE Journal , 1982 . D. Couzin. Depths of Field. SMPTE Journal, 1982."},{"key":"e_1_3_2_1_8_1","unstructured":"Crime Scene. Latent fingerprint kit professional. http:\/\/www.crimescene.com\/store\/index.php?main_page=product_info&products_id=103 2012.  Crime Scene. Latent fingerprint kit professional. http:\/\/www.crimescene.com\/store\/index.php?main_page=product_info&products_id=103 2012."},{"key":"e_1_3_2_1_9_1","unstructured":"EVIDENT INC. Forensic field kits. http:\/\/www.evidentcrimescene.com\/cata\/kits\/kits.html 2012.  EVIDENT INC. Forensic field kits. http:\/\/www.evidentcrimescene.com\/cata\/kits\/kits.html 2012."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018427.1020552"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.841531"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866395"},{"key":"e_1_3_2_1_14_1","volume-title":"The state of the touch-screen panel market","author":"Lee D.","year":"2011","unstructured":"D. Lee . The state of the touch-screen panel market in 2011 . http:\/\/www.walkermobile.com\/March_2011_ID_State_of_the_Touch_Screen_Market.pdf, March 2011. D. Lee. The state of the touch-screen panel market in 2011. http:\/\/www.walkermobile.com\/March_2011_ID_State_of_the_Touch_Screen_Market.pdf, March 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2011.6122840"},{"key":"e_1_3_2_1_16_1","volume-title":"Light Scattering by Inhomogeneous Media. Zh. Russ. Fiz-Khim. Ova., 58(381)","author":"Mandelstam L.","year":"1926","unstructured":"L. Mandelstam . Light Scattering by Inhomogeneous Media. Zh. Russ. Fiz-Khim. Ova., 58(381) , 1926 . L. Mandelstam. Light Scattering by Inhomogeneous Media. Zh. Russ. Fiz-Khim. Ova., 58(381), 1926."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_2_1_18_1","volume-title":"Basic Latent Print Development","author":"Mock J. P.","year":"1993","unstructured":"J. P. Mock . Basic Latent Print Development . Lighting Powder Company, Inc. , 1993 . J. P. Mock. Basic Latent Print Development. Lighting Powder Company, Inc., 1993."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of Workshop On Offensive Technologies (WOOT)","author":"Mowery K.","year":"2011","unstructured":"K. Mowery , S. Meiklejohn , and S. Savage . Heat of the moment: Characterizing the efficacy of thermal camera-based attacks . In Proceedings of Workshop On Offensive Technologies (WOOT) , 2011 . K. Mowery, S. Meiklejohn, and S. Savage. Heat of the moment: Characterizing the efficacy of thermal camera-based attacks. In Proceedings of Workshop On Offensive Technologies (WOOT), 2011."},{"key":"e_1_3_2_1_20_1","unstructured":"Nanogate. Fine material with a permanently fine appearance. http:\/\/www.nanogate.de\/en\/product-enhancement\/functions\/nanotension\/anti-fingerprint.php 2012.  Nanogate. Fine material with a permanently fine appearance. http:\/\/www.nanogate.de\/en\/product-enhancement\/functions\/nanotension\/anti-fingerprint.php 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1979.4310076"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"key":"e_1_3_2_1_24_1","unstructured":"L. Rosa. Adjacent orientation vector based fingerprint minutiae matching system. http:\/\/www.advancedsourcecode.com\/aovminutiae.asp 2012.  L. Rosa. Adjacent orientation vector based fingerprint minutiae matching system. http:\/\/www.advancedsourcecode.com\/aovminutiae.asp 2012."},{"key":"e_1_3_2_1_25_1","unstructured":"L. Rosa. Correlation-filter based method. http:\/\/www.advancedsourcecode.com\/fingerprint4.asp 2012.  L. Rosa. Correlation-filter based method. http:\/\/www.advancedsourcecode.com\/fingerprint4.asp 2012."},{"key":"e_1_3_2_1_26_1","unstructured":"L. Rosa. Filterbank-based fingerprint matching. http:\/\/www.advancedsourcecode.com\/fingerprint.asp 2012.  L. Rosa. Filterbank-based fingerprint matching. http:\/\/www.advancedsourcecode.com\/fingerprint.asp 2012."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/0734-189X(89)90131-X"},{"key":"e_1_3_2_1_28_1","volume-title":"August","author":"Venkataramani K.","year":"2004","unstructured":"K. Venkataramani and B. V. K. V. Kumar . Performance of composite correlation filters in fingerprint verification. Optical Engineering, 43(8) , August 2004 . K. Venkataramani and B. V. K. V. Kumar. Performance of composite correlation filters in fingerprint verification. Optical Engineering, 43(8), August 2004."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855769"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_31_1","unstructured":"M. Zalewski. Cracking safes with thermal imaging. http:\/\/lcamtuf.coredump.cx\/tsafe\/ 2005.  M. Zalewski. Cracking safes with thermal imaging. http:\/\/lcamtuf.coredump.cx\/tsafe\/ 2005."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102169"}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","location":"Raleigh North Carolina USA","acronym":"CCS'12","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381934.2381947","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381934.2381947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:41Z","timestamp":1750239281000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381934.2381947"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,19]]},"references-count":32,"alternative-id":["10.1145\/2381934.2381947","10.1145\/2381934"],"URL":"https:\/\/doi.org\/10.1145\/2381934.2381947","relation":{},"subject":[],"published":{"date-parts":[[2012,10,19]]},"assertion":[{"value":"2012-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}