{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:17:36Z","timestamp":1769923056785,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-13-2-0274"],"award-info":[{"award-number":["FA8750-13-2-0274"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660360","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"904-917","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":111,"title":["Beware, Your Hands Reveal Your Secrets!"],"prefix":"10.1145","author":[{"given":"Diksha","family":"Shukla","sequence":"first","affiliation":[{"name":"Syracuse University, Syracuse, USA"}]},{"given":"Rajesh","family":"Kumar","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, USA"}]},{"given":"Abdul","family":"Serwadda","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, USA"}]},{"given":"Vir V.","family":"Phoha","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"320","volume-title":"A fast eavesdropping attack against touchscreens,\" in phInformation Assurance and Security (IAS)","author":"Maggi F.","year":"2011","unstructured":"F. Maggi , A. Volpatto , S. Gasparini , G. Boracchi , and S. Zanero , \" A fast eavesdropping attack against touchscreens,\" in phInformation Assurance and Security (IAS) , 2011 , pp. 320 -- 325 . F. Maggi, A. Volpatto, S. Gasparini, G. Boracchi, and S. Zanero, \"A fast eavesdropping attack against touchscreens,\" in phInformation Assurance and Security (IAS), 2011, pp. 320--325."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.28"},{"key":"e_1_3_2_1_3_1","volume-title":"last accessed","year":"2013","unstructured":"\"3m privacy universal trim-to-fit screen protector for smartphones,\" http:\/\/www.amazon.com\/3M-Universal-Trim-To-Fit-Protector-SmartPhones\/dp\/B0053CG9M8 , last accessed : Oct , 2013 . \"3m privacy universal trim-to-fit screen protector for smartphones,\" http:\/\/www.amazon.com\/3M-Universal-Trim-To-Fit-Protector-SmartPhones\/dp\/B0053CG9M8, last accessed: Oct, 2013."},{"key":"e_1_3_2_1_4_1","volume-title":"last accessed","year":"2013","unstructured":"\"The bulletin news,\" http:\/\/www.bendbulletin.com\/article\/20130430\/NEWS0107\/130429979\/ , last accessed : Oct , 2013 . \"The bulletin news,\" http:\/\/www.bendbulletin.com\/article\/20130430\/NEWS0107\/130429979\/, last accessed: Oct, 2013."},{"key":"e_1_3_2_1_5_1","volume-title":"last accessed","year":"2013","unstructured":"\"Google unveils 'project glass' virtual-reality glasses,\" http:\/\/money.cnn.com\/2012\/04\/04\/technology\/google-project-glass\/?source=cnn_bin , last accessed : Oct , 2013 . \"Google unveils 'project glass' virtual-reality glasses,\" http:\/\/money.cnn.com\/2012\/04\/04\/technology\/google-project-glass\/?source=cnn_bin, last accessed: Oct, 2013."},{"key":"e_1_3_2_1_6_1","volume-title":"last accessed","author":"Merchant B.","year":"2013","unstructured":"B. Merchant , \"Half of all americans are now checking their smart phones 15 0 times a day,\" http:\/\/motherboard.vice.com\/blog\/half-of-all-americans-are-now-checking-their-smart-phones-150-times-a-day , last accessed : Oct , 2013 . B. Merchant, \"Half of all americans are now checking their smart phones 150 times a day,\" http:\/\/motherboard.vice.com\/blog\/half-of-all-americans-are-now-checking-their-smart-phones-150-times-a-day, last accessed: Oct, 2013."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516709"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.25"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1023803"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.189"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.11.010"},{"key":"e_1_3_2_1_13_1","first-page":"9","volume-title":"Touchlogger: inferring keystrokes on touch screen from smartphone motion,\" in phProceedings of the 6th USENIX conference on Hot topics in security, ser. HotSec'11","author":"Cai L.","unstructured":"L. Cai and H. Chen , \" Touchlogger: inferring keystrokes on touch screen from smartphone motion,\" in phProceedings of the 6th USENIX conference on Hot topics in security, ser. HotSec'11 . USENIX Association , pp. 9 -- 9 . L. Cai and H. Chen, \"Touchlogger: inferring keystrokes on touch screen from smartphone motion,\" in phProceedings of the 6th USENIX conference on Hot topics in security, ser. HotSec'11.USENIX Association, pp. 9--9."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516770"},{"key":"e_1_3_2_1_18_1","volume-title":"last accessed","year":"2014","unstructured":"\"Mail online,\" http:\/\/www.dailymail.co.uk\/news\/article-2200956\/President-Barack-Obama-experiences-technical-difficulties-campaign-trail--struggling-use-iPhone.html , last accessed : Feb , 2014 . \"Mail online,\" http:\/\/www.dailymail.co.uk\/news\/article-2200956\/President-Barack-Obama-experiences-technical-difficulties-campaign-trail--struggling-use-iPhone.html, last accessed: Feb, 2014."},{"key":"e_1_3_2_1_19_1","volume-title":"last accessed","year":"2013","unstructured":"\"Samsung galaxy s4,\" http:\/\/www.samsung.com\/global\/microsite\/galaxys4\/ , last accessed : Oct , 2013 . \"Samsung galaxy s4,\" http:\/\/www.samsung.com\/global\/microsite\/galaxys4\/, last accessed: Oct, 2013."},{"key":"e_1_3_2_1_20_1","volume-title":"last accessed","year":"2013","unstructured":"\"Windows movie maker,\" http:\/\/windows.microsoft.com\/en-us\/windows-live\/movie-maker#t1=overview , last accessed : Aug , 2013 . \"Windows movie maker,\" http:\/\/windows.microsoft.com\/en-us\/windows-live\/movie-maker#t1=overview, last accessed: Aug, 2013."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.239"},{"key":"e_1_3_2_1_22_1","volume-title":"last accessed","year":"2013","unstructured":"\"Tld,\" http:\/\/kahlan.eps.surrey.ac.uk\/featurespace\/tld\/ , last accessed : Aug , 2013 . \"Tld,\" http:\/\/kahlan.eps.surrey.ac.uk\/featurespace\/tld\/, last accessed: Aug, 2013."},{"key":"e_1_3_2_1_23_1","first-page":"1","volume-title":"WOOT'10","author":"Aviv A. J.","year":"2010","unstructured":"A. J. Aviv , K. Gibson , E. Mossop , M. Blaze , and J. M. Smith , \" Smudge attacks on smartphone touch screens,\" in Proceedings of the 4th USENIX Conference on Offensive Technologies, ser . WOOT'10 . Berkeley, CA, USA: USENIX Association , 2010 , pp. 1 -- 7 . {Online}. Available: http:\/\/dl.acm.org\/citation.cfm?id=1925004.1925009 A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, \"Smudge attacks on smartphone touch screens,\" in Proceedings of the 4th USENIX Conference on Offensive Technologies, ser. WOOT'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1--7. {Online}. Available: http:\/\/dl.acm.org\/citation.cfm?id=1925004.1925009"},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"BTAS'13","author":"Serwadda A.","year":"2013","unstructured":"A. Serwadda , V. Phoha , and Z. Wang , \" Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms,\"; in IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), ser . BTAS'13 , Sept 2013 , pp. 1 -- 8 . A. Serwadda, V. Phoha, and Z. Wang, \"Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms,\"; in IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), ser. BTAS'13, Sept 2013, pp. 1--8."}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","location":"Scottsdale Arizona USA","acronym":"CCS'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660360","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:40Z","timestamp":1750227220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":24,"alternative-id":["10.1145\/2660267.2660360","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660360","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}