{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T18:47:12Z","timestamp":1768070832168,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1526524,CNS-1547350"],"award-info":[{"award-number":["CNS-1526524,CNS-1547350"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978328","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"908-919","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["The Sounds of the Phones"],"prefix":"10.1145","author":[{"given":"Babins","family":"Shrestha","sequence":"first","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Maliheh","family":"Shirvanian","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, USA"}]},{"given":"Prakash","family":"Shrestha","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anonymous leaks database from israeli musical act magazine site#opisrael. http:\/\/thehackernews.com\/2012\/12\/anonymous-leaks-database-from-israeli.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Bulgarian torrent tracker forum hacked and accused of collecting user ip. http:\/\/thehackernews.com\/2012\/11\/bulgarian-torrent-tracker-forum-hacked.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Celestix hotpin two factor authentication. http:\/\/www.celestixworks.com\/HOTPin.asp."},{"key":"e_1_3_2_1_4_1","unstructured":"Coalition of law enforcement hacked & agents information leaked. http:\/\/thehackernews.com\/2011\/12\/coalition-of-law-enforcement-hacked.html."},{"key":"e_1_3_2_1_5_1","unstructured":"Google acquires slicklogin the sound-based password alternative. http:\/\/techcrunch.com\/2014\/02\/16\/google-acquires-slicklogin-the-sound-based-password-alternative\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Hacker leaks 250gb of nasa data another group claims to hijack nasa drone. https:\/\/www.hackread.com\/nasa-data-leaked-nasa-drone-hacked\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Snapchat hacked: 4.6 million user names partial phone numbers leaked - ABC15 Arizona. http:\/\/www.abc15.com\/news\/local-news\/water-cooler\/snapchat-hacked-46-million-user-names-partial-phone-numbers-leaked."},{"key":"e_1_3_2_1_8_1","unstructured":"Sony europe hacked by lebanese hacker... again - naked security. https:\/\/nakedsecurity.sophos.com\/2011\/06\/04\/sony-europe-hacked-by-lebanese-hacker-again\/."},{"key":"e_1_3_2_1_9_1","unstructured":"What's in the ashley madison database that hackers released online - quartz. http:\/\/qz.com\/482875\/whats-in-the-ashley-madison-database-that-hackers-released-online\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Authy Inc. Two-factor authentication - Authy. https:\/\/www.authy.com\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382240"},{"key":"e_1_3_2_1_12_1","unstructured":"Duo Security Inc. Easy mobile two-factor authentication. https:\/\/duo.com\/solutions\/features\/user-experience\/easy-authentication."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_14_1","unstructured":"Google Inc. Google 2-step verification. https:\/\/www.google.com\/landing\/2step\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Google Inc. WebRTC. https:\/\/webrtc.org\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_22"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831174"},{"key":"e_1_3_2_1_18_1","volume-title":"Computing Pearson's r","author":"Lane D.","year":"2003","unstructured":"D. Lane. Computing Pearson's r, 2003. http:\/\/cnx.org\/contents\/9zcGzDDu@4\/Computing-Pearsons-r."},{"key":"e_1_3_2_1_19_1","unstructured":"MathWorks. Butterworth filter design. http:\/\/www.mathworks.com\/help\/signal\/ref\/butter.html."},{"key":"e_1_3_2_1_20_1","volume-title":"of Illinois at Urbana-Champaign","author":"U.","year":"2011","unstructured":"U. of Illinois at Urbana-Champaign. Center frequencies and high\/low frequency limits for octave bands, 1\/2- and 1\/3-octave bands, 2011. https:\/\/courses.physics.illinois.edu\/phys193\/labs\/octave_bands.pdf."},{"key":"e_1_3_2_1_21_1","unstructured":"RSA. Securid | rsa security token based authentication. https:\/\/www.rsa.com\/en-us\/products-services\/identity-access-management\/securid."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23167"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855793"},{"key":"e_1_3_2_1_25_1","unstructured":"The Engineering ToolBox. Octave bands - frequency limits. http:\/\/www.engineeringtoolbox.com\/octave-bands-frequency-limits-d_1602.html."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2014.6813957"},{"key":"e_1_3_2_1_27_1","unstructured":"Yubico AB. Trust the net with yubikey strong two-factor authentication. https:\/\/www.yubico.com\/."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978328","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:24:04Z","timestamp":1763457844000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978328"}},"subtitle":["Dangers of Zero-Effort Second Factor Login based on Ambient Audio"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":27,"alternative-id":["10.1145\/2976749.2978328","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978328","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}