{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T02:57:48Z","timestamp":1774580268849,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The German Research Foundation within the SimTech Cluster of Excellence","award":["(EXC 310\/2)"],"award-info":[{"award-number":["(EXC 310\/2)"]}]},{"name":"AMPLIFY project under the ERC consolidator grants for researchers at the University of Stuttgart"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025461","type":"proceedings-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:34:28Z","timestamp":1493814868000},"page":"3751-3763","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":98,"title":["Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication"],"prefix":"10.1145","author":[{"given":"Yomna","family":"Abdelrahman","sequence":"first","affiliation":[{"name":"University of Stuttgart, Stuttgart, Germany"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"LMU Munich, Munich, Germany"}]},{"given":"Stefan","family":"Schneegass","sequence":"additional","affiliation":[{"name":"University of Stuttgart, Stuttgart, Germany"}]},{"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"LMU Munich, Munich, Bavaria, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702290"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012709.3012727"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785882"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462098"},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10)","author":"Aviv Adam J.","year":"1925","unstructured":"Adam J. Aviv , Katherine Gibson , Evan Mossop , Matt Blaze , and Jonathan M. Smith . 2010. Smudge Attacks on Smartphone Touch Screens . In Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10) . USENIX, Berkeley, CA, USA, 1--7. http: \/\/dl.acm.org\/citation.cfm?id= 1925 004.1925009 Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. 2010. Smudge Attacks on Smartphone Touch Screens. In Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10). USENIX, Berkeley, CA, USA, 1--7. http: \/\/dl.acm.org\/citation.cfm?id=1925004.1925009"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935701.1935740"},{"key":"e_1_3_2_2_7_1","volume-title":"Spinlock: A Single-Cue Haptic and Audio PIN Input Technique for Authentication","author":"Bianchi Andrea","year":"2011","unstructured":"Andrea Bianchi , Ian Oakley , and DongSoo Kwon . 2011 . Spinlock: A Single-Cue Haptic and Audio PIN Input Technique for Authentication . In Haptic and Audio Interaction Design, EricW. Cooper, VictorV. Kryssanov, Hitoshi Ogawa, and Stephen Brewster (Eds.). Lecture Notes in Computer Science, Vol. 6851 . Springer Berlin Heidelberg , 81--90. Andrea Bianchi, Ian Oakley, and DongSoo Kwon. 2011. Spinlock: A Single-Cue Haptic and Audio PIN Input Technique for Authentication. In Haptic and Audio Interaction Design, EricW. Cooper, VictorV. Kryssanov, Hitoshi Ogawa, and Stephen Brewster (Eds.). Lecture Notes in Computer Science, Vol. 6851. Springer Berlin Heidelberg, 81--90."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2012.06.005"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702252"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2016.7477241"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0017-9310(69)90011-8"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702141"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481330"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481331"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/361237.361242"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892511"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2757710.2757713"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785834"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858267"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501607"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858139"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807458"},{"key":"e_1_3_2_2_27_1","volume-title":"Thermal radiation heat transfer","author":"Howell John R","unstructured":"John R Howell , M Pinar Menguc , and Robert Siegel . 2010. Thermal radiation heat transfer . CRC press . John R Howell, M Pinar Menguc, and Robert Siegel. 2010. Thermal radiation heat transfer. CRC press."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.1998.745598"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892314"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1152934.1152939"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-6655-0"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979317"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28166-7_22"},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of the 5th USENIX Conference on Offensive Technologies (WOOT'11)","author":"Mowery Keaton","year":"2011","unstructured":"Keaton Mowery , Sarah Meiklejohn , and Stefan Savage . 2011 . Heat of the Moment: Characterizing the Efficacy of Thermal Camera-based Attacks . In Proceedings of the 5th USENIX Conference on Offensive Technologies (WOOT'11) . USENIX Association, Berkeley, CA, USA. Keaton Mowery, Sarah Meiklejohn, and Stefan Savage. 2011. Heat of the Moment: Characterizing the Efficacy of Thermal Camera-based Attacks. In Proceedings of the 5th USENIX Conference on Offensive Technologies (WOOT'11). USENIX Association, Berkeley, CA, USA."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370329"},{"key":"e_1_3_2_2_36_1","first-page":"49","article-title":"Keeping Secrets from Friends","volume":"27","author":"Oakley Ian","year":"2014","unstructured":"Ian Oakley and Andrea Bianchi . 2014 . Keeping Secrets from Friends . Archives of Design Research 27 (2014), 49 -- 62 . http:\/\/www.dbpia.co.kr\/Article\/NODE02465396 Ian Oakley and Andrea Bianchi. 2014. Keeping Secrets from Friends. Archives of Design Research 27 (2014), 49--62. http:\/\/www.dbpia.co.kr\/Article\/NODE02465396","journal-title":"Archives of Design Research"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(75)90044-8"},{"key":"e_1_3_2_2_38_1","volume-title":"Proc. ICEE.","author":"Parsons KC","year":"1992","unstructured":"KC Parsons . 1992 . Contact between human skin & hot surfaces equivalent contact temperature . In Proc. ICEE. KC Parsons. 1992. Contact between human skin & hot surfaces equivalent contact temperature. In Proc. ICEE."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378727.1389971"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0003-6870(84)90123-6"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1088\/0967-3334\/33\/3\/R33"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557208"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636090"},{"key":"e_1_3_2_2_44_1","volume-title":"Accessed","author":"Technologies Corning Display","year":"2006","unstructured":"Corning Display Technologies . 2006 . Glass Material Information. http:\/\/www.sydor.com\/wp-content\/ uploads\/Corning-EAGLE-XG-Display-Glass.pdf. (2006) . Accessed September 19, 2016. Corning Display Technologies. 2006. Glass Material Information. http:\/\/www.sydor.com\/wp-content\/ uploads\/Corning-EAGLE-XG-Display-Glass.pdf. (2006). Accessed September 19, 2016."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702212"},{"key":"e_1_3_2_2_47_1","volume-title":"Alexander De Luca, and Heinrich Hussmann","author":"von Zezschwitz Emanuel","year":"2013","unstructured":"Emanuel von Zezschwitz , Alexander De Luca, and Heinrich Hussmann . 2013 . Survival of the Shortest : A Retrospective Analysis of Influencing Factors on Password Composition. Springer Berlin Heidelberg , Berlin, Heidelberg, 460--467. DOI: http:\/\/dx.doi.org\/10.1007\/978--3--642--40477--1_28 10.1007\/978--3--642--40477--1_28 Emanuel von Zezschwitz, Alexander De Luca, and Heinrich Hussmann. 2013. Survival of the Shortest: A Retrospective Analysis of Influencing Factors on Password Composition. Springer Berlin Heidelberg, Berlin, Heidelberg, 460--467. DOI: http:\/\/dx.doi.org\/10.1007\/978--3--642--40477--1_28"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702202"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493231"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858120"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2449396.2449432"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2935334.2935388"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025461","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:43Z","timestamp":1750221523000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025461"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":51,"alternative-id":["10.1145\/3025453.3025461","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025461","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}