{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:46:32Z","timestamp":1774539992323,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61125202"],"award-info":[{"award-number":["61125202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402338"],"award-info":[{"award-number":["61402338"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472219"],"award-info":[{"award-number":["61472219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660296","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"453-464","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":130,"title":["Context-free Attacks Using Keyboard Acoustic Emanations"],"prefix":"10.1145","author":[{"given":"Tong","family":"Zhu","sequence":"first","affiliation":[{"name":"Tsinghua University &amp; Tsinghua National Lab IOT Center WuXi, Beijing, China"}]},{"given":"Qiang","family":"Ma","sequence":"additional","affiliation":[{"name":"Tsinghua University &amp; Tsinghua National Lab IOT Center WuXi, Tsinghua, China"}]},{"given":"Shanfeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University &amp; HKUST, Beijing, China"}]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"P. Arena. Apple iPhone 5 has three microphones and HD voice support what's in it for you. http:\/\/www.phonearena.com\/news\/Apple-iPhone-5-has-three-microphones-and-HD-voice-support-whats-in-it-for-you_id34486 2012. {Online; accessed 30-July-2014}.  P. Arena. Apple iPhone 5 has three microphones and HD voice support what's in it for you. http:\/\/www.phonearena.com\/news\/Apple-iPhone-5-has-three-microphones-and-HD-voice-support-whats-in-it-for-you_id34486 2012. {Online; accessed 30-July-2014}."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"e_1_3_2_1_3_1","first-page":"307","volume-title":"Proceedings of USENIX Security Symposium","author":"Backes M.","year":"2010"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of 5th Aunnual Colloquium, The History of Military Comunications","author":"Bauer A. O.","year":"1999"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.21"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601097.2601119"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844143"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182841"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013767926256"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.57"},{"key":"e_1_3_2_1_15_1","first-page":"1065","volume-title":"Proceedings of IEEE ICASSP","author":"Jia Y.","year":"2006"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1976.1162830"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098920"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248417"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530797"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2146417.2146421"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.1999997"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070962"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2004.1326212"},{"key":"e_1_3_2_1_26_1","unstructured":"R. SINGEL. Declassified NSA Document Reveals the Secret History of TEMPEST. http:\/\/www.wired.com\/2008\/04\/nsa-release-se 2004. {Online; accessed 23-July-2014}.  R. SINGEL. Declassified NSA Document Reveals the Secret History of TEMPEST. http:\/\/www.wired.com\/2008\/04\/nsa-release-se 2004. {Online; accessed 23-July-2014}."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248415"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2004.1316761"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of USENIX Security Symposium","author":"Song D. X.","year":"2001"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594380"},{"key":"e_1_3_2_1_31_1","unstructured":"T. Thomas. Malware on the move. 2008.  T. Thomas. Malware on the move. 2008."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/844378.844416"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594384"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464447"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030625"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307638"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102169"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","location":"Scottsdale Arizona USA","acronym":"CCS'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660296","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:10Z","timestamp":1750229770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":37,"alternative-id":["10.1145\/2660267.2660296","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660296","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}