{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:58:43Z","timestamp":1755838723052,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3232826","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["There Goes Your PIN"],"prefix":"10.1145","author":[{"given":"David","family":"Berend","sequence":"first","affiliation":[{"name":"Temasek Laboratories, Nanyang Technological University, Singapore"}]},{"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[{"name":"Temasek Laboratories, Nanyang Technological University, Singapore and University of Applied Sciences Wiesbaden, R\u00fcsselsheim, Germany"}]},{"given":"Bernhard","family":"Jungk","sequence":"additional","affiliation":[{"name":"Cyber and Information Security Group, Fraunhofer Singapore and Temasek Laboratories"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2013.12.285"},{"key":"e_1_3_2_1_2_1","volume-title":"Smith","author":"Aviv Adam J.","year":"2012","unstructured":"Adam J. Aviv and Jonathan M . Smith . 2012 . Side Channels Enabled by Smartphone Interaction. Ph.D. Dissertation. Univ. of Pennsylvania , Pennsylvania. Adam J. Aviv and Jonathan M. Smith. 2012. Side Channels Enabled by Smartphone Interaction. Ph.D. Dissertation. Univ. of Pennsylvania, Pennsylvania."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of the 6th USENIX Conference on Hot Topics in Security (HotSec'11)","author":"Cai Liang","year":"2011","unstructured":"Liang Cai and Hao Chen . 2011 . TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion . In Proc. of the 6th USENIX Conference on Hot Topics in Security (HotSec'11) . USENIX Association, Berkeley, CA, USA, 9--9. Liang Cai and Hao Chen. 2011. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion. In Proc. of the 6th USENIX Conference on Hot Topics in Security (HotSec'11). USENIX Association, Berkeley, CA, USA, 9--9."},{"volume-title":"I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics","author":"Giuffrida Cristiano","key":"e_1_3_2_1_5_1","unstructured":"Cristiano Giuffrida , Kamil Majdanik , Mauro Conti , and Herbert Bos . 2014. I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics . Springer International Publishing , Cham , 92--111. Cristiano Giuffrida, Kamil Majdanik, Mauro Conti, and Herbert Bos. 2014. I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics. Springer International Publishing, Cham, 92--111."},{"key":"e_1_3_2_1_6_1","volume-title":"Standard ECMA-404. (Oct.","author":"International Ecma","year":"2013","unstructured":"Ecma International . 2013. JSON Data Interchange Format , Standard ECMA-404. (Oct. 2013 ). Ecma International. 2013. JSON Data Interchange Format, Standard ECMA-404. (Oct. 2013)."},{"volume-title":"Advances in cryptology\u00e2\u0102\u0164CRYPTO\u00e2\u0102&Zacute;99","author":"Kocher Paul","key":"e_1_3_2_1_7_1","unstructured":"Paul Kocher , Joshua Jaffe , and Benjamin Jun . 1999. Differential power analysis . In Advances in cryptology\u00e2\u0102\u0164CRYPTO\u00e2\u0102&Zacute;99 . Springer , 789--789. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Advances in cryptology\u00e2\u0102\u0164CRYPTO\u00e2\u0102&Zacute;99. Springer, 789--789."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0369-x"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15)","author":"Michalevsky Yan","year":"2015","unstructured":"Yan Michalevsky , Gabi Nakibly , Gunaa Arumugam Veerapandian , Dan Boneh , and Gabi Nakibly . 2015 . PowerSpy: Location Tracking Using Mobile Device Power Analysis . In Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15) . USENIX Association, Berkeley, CA, USA, 785--800. Yan Michalevsky, Gabi Nakibly, Gunaa Arumugam Veerapandian, Dan Boneh, and Gabi Nakibly. 2015. PowerSpy: Location Tracking Using Mobile Device Power Analysis. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15). USENIX Association, Berkeley, CA, USA, 785--800."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.04.032"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666622"},{"volume-title":"Global smartphone sales by operting system since","year":"2009","key":"e_1_3_2_1_13_1","unstructured":"Statista. 2008. Global smartphone sales by operting system since 2009 . (Sept. 2008). Statista. 2008. Global smartphone sales by operting system since 2009. (Sept. 2008)."},{"volume-title":"Number of Smartphone Users Worldwide 2014-2020. (Jan","year":"2015","key":"e_1_3_2_1_14_1","unstructured":"Statista. 2015. Number of Smartphone Users Worldwide 2014-2020. (Jan . 2015 ). Statista. 2015. Number of Smartphone Users Worldwide 2014-2020. (Jan. 2015)."},{"key":"e_1_3_2_1_15_1","first-page":"3","article-title":"Activity recognition with smartphone sensors","volume":"19","author":"Su X.","year":"2014","unstructured":"X. Su , H. Tong , and P. Ji . 2014 . Activity recognition with smartphone sensors . Tsinghua Science and Technology 19 , 3 (June 2014), 235--249. X. Su, H. Tong, and P. Ji. 2014. Activity recognition with smartphone sensors. Tsinghua Science and Technology 19, 3 (June 2014), 235--249.","journal-title":"Tsinghua Science and Technology"},{"key":"e_1_3_2_1_16_1","volume-title":"Malicious cloned games attack Google Android Market. Naked Security: http:\/\/nakedsecurity.sophos.com\/2011\/12\/12\/malicious-cloned-games-attack-google-android-market","author":"Svajcer Vanja","year":"2011","unstructured":"Vanja Svajcer . 2011. Malicious cloned games attack Google Android Market. Naked Security: http:\/\/nakedsecurity.sophos.com\/2011\/12\/12\/malicious-cloned-games-attack-google-android-market ( 2011 ). Vanja Svajcer. 2011. Malicious cloned games attack Google Android Market. Naked Security: http:\/\/nakedsecurity.sophos.com\/2011\/12\/12\/malicious-cloned-games-attack-google-android-market (2011)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232826","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3232826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232826"}},"subtitle":["Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":16,"alternative-id":["10.1145\/3230833.3232826","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3232826","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}