{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:45:47Z","timestamp":1760784347904,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2015R1A2A2A01004792"],"award-info":[{"award-number":["NRF-2015R1A2A2A01004792"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Information & communications Technology Promotion (IITP)","award":["2017-0-00380"],"award-info":[{"award-number":["2017-0-00380"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3138832","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2515-2517","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Seungyeon","family":"Kim","sequence":"first","affiliation":[{"name":"Yonsei University, Seoul, South Korea"}]},{"given":"Hoyeon","family":"Lee","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, South Korea"}]},{"given":"Taekyoung","family":"Kwon","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Smith","author":"Aviv Adam J.","year":"2010","unstructured":"Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith 2010. Smudge attacks on smartphone touch screens. In Proceedings of WOOT '10, Vol. Vol. 10. 1--7."},{"key":"e_1_3_2_1_2_1","volume-title":"Jain","author":"Cao Kai","year":"2016","unstructured":"Kai Cao and Anil K. Jain 2016. Hacking mobile phones using 2D printed fingerprints. Technical Report. Department of Computer Science and Engineering, Michigan State University."},{"key":"e_1_3_2_1_3_1","first-page":"747","article-title":"Marking comprising two patterns on a surface. (Aug. 2017)","volume":"9","author":"Decoux Eric","year":"2017","unstructured":"Eric Decoux and Patrick Bovey 2017. Marking comprising two patterns on a surface. (Aug. 2017). US Patent 9,747,473.","journal-title":"US Patent"},{"key":"e_1_3_2_1_4_1","unstructured":"JLaservideo. 2016. How To Copy a Fingerprint Like a Spy - iPhone Touch ID Hack!!! https:\/\/www.youtube.com\/watch?v=bp-MrrAmprA."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of ACSAC '17","author":"Lee Hoyeon","year":"2017","unstructured":"Hoyeon Lee, Seungyeon Kim, and Taekyoung Kwon. 2017. Here is your fingerprint! actual risk versus user perception of latent fingerprints and smudges remaining on smartphones. In Proceedings of ACSAC '17."},{"key":"e_1_3_2_1_6_1","unstructured":"Marc Rogers. 2014. Hacking Apple TouchID on the iPhone 6. https:\/\/www.youtube.com\/watch?v=GPLiEC_tG1k."},{"key":"e_1_3_2_1_7_1","unstructured":"Oki Rosgani. 2013. faking the Apple trackID fingerprint sensor. https:\/\/www.youtube.com\/watch?v=qjRD8_ZoGuE."},{"key":"e_1_3_2_1_8_1","first-page":"582","article-title":"Electronic device including finger biometric sensor carried by a touch display and related methods. (Feb. 2017)","volume":"9","author":"Setlak Dale R","year":"2017","unstructured":"Dale R Setlak. 2017. Electronic device including finger biometric sensor carried by a touch display and related methods. (Feb. 2017). US Patent 9,582,102.","journal-title":"US Patent"},{"key":"e_1_3_2_1_9_1","unstructured":"Robert Va\u017ean. 2017. SourceAFIS. https:\/\/sourceafis.angeloflogic.com\/."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3138832","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3138832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:04Z","timestamp":1750212664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3138832"}},"subtitle":["Rethinking Fingerprint Identification on Smartphones"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":9,"alternative-id":["10.1145\/3133956.3138832","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3138832","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}