{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:30Z","timestamp":1750308690116,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3319726","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"163-173","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Fatal attraction"],"prefix":"10.1145","author":[{"given":"Beatrice","family":"Perez","sequence":"first","affiliation":[{"name":"University College London, London, UK"}]},{"given":"Mirco","family":"Musolesi","sequence":"additional","affiliation":[{"name":"University College London, London, UK"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Boston University"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Electromagnetic fields and public health. http:\/\/www.who.int\/peh-emf\/publications\/facts\/fs299\/en\/. Accessed: 2018-11-10.  2016. Electromagnetic fields and public health. http:\/\/www.who.int\/peh-emf\/publications\/facts\/fs299\/en\/. Accessed: 2018-11-10."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Activity Manager: Android Developers. https:\/\/developer.android.com\/reference\/android\/app\/ActivityManager.html. Accessed: 2018-11-10.  2018. Activity Manager: Android Developers. https:\/\/developer.android.com\/reference\/android\/app\/ActivityManager.html. Accessed: 2018-11-10."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. Best Practices for App Permissions: Android Developers. https:\/\/developer.android.com\/training\/articles\/user-data-permissions.html. Accessed: 2018-11-10.  2018. Best Practices for App Permissions: Android Developers. https:\/\/developer.android.com\/training\/articles\/user-data-permissions.html. Accessed: 2018-11-10."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. HAL Interface: Android Open Source Project. https:\/\/source.android.com\/devices\/sensors\/hal-interface. Accessed: 2018-11-10.  2018. HAL Interface: Android Open Source Project. https:\/\/source.android.com\/devices\/sensors\/hal-interface. Accessed: 2018-11-10."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Measuring Earth's Magnetism. https:\/\/earthobservatory.nasa.gov\/images\/84266\/measuring-earths-magnetism. Accessed: 2018-11-10.  2018. Measuring Earth's Magnetism. https:\/\/earthobservatory.nasa.gov\/images\/84266\/measuring-earths-magnetism. Accessed: 2018-11-10."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. PRIME Faraday Technology Watch 2002: An Introduction to MEMS. http:\/\/www.lboro.ac.uk\/microsites\/mechman\/research\/ipm-ktn\/pdf\/Technology_review\/an-introduction-to-mems.pdf. Accessed: 2018-11-10.  2018. PRIME Faraday Technology Watch 2002: An Introduction to MEMS. http:\/\/www.lboro.ac.uk\/microsites\/mechman\/research\/ipm-ktn\/pdf\/Technology_review\/an-introduction-to-mems.pdf. Accessed: 2018-11-10."},{"key":"e_1_3_2_1_7_1","unstructured":"2018. Sensor Stack: Android Open Source Project. https:\/\/source.android.com\/devices\/sensors\/sensor-stack. Accessed: 2018-11-10.  2018. Sensor Stack: Android Open Source Project. https:\/\/source.android.com\/devices\/sensors\/sensor-stack. Accessed: 2018-11-10."},{"key":"e_1_3_2_1_8_1","unstructured":"2018. Sensor Types: Android Open Source Project. https:\/\/source.android.com\/devices\/sensors\/sensor-types. Accessed: 2018-11-10.  2018. Sensor Types: Android Open Source Project. https:\/\/source.android.com\/devices\/sensors\/sensor-types. Accessed: 2018-11-10."},{"key":"e_1_3_2_1_9_1","unstructured":"2018. Sensors Overview: Android Open Source Project. https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview.html. Accessed: 2018-11-10.  2018. Sensors Overview: Android Open Source Project. https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview.html. Accessed: 2018-11-10."},{"volume-title":"On the Unicity of Smartphone Applications. In WPES '15","year":"2015","author":"Achara Jagdish Prasad","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Alasdair Allan. 2011. Basic sensors in IOS: Programming the accelerometer gyroscope and more. O'Reilly Media.   Alasdair Allan. 2011. Basic sensors in IOS: Programming the accelerometer gyroscope and more. O'Reilly Media."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823922"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17040783"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23238"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Sebastian Biedermann Stefan Katzenbeisser and Jakub Szefer. 2015. Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors. Springer Berlin Heidelberg Berlin Heidelberg 489--496.  Sebastian Biedermann Stefan Katzenbeisser and Jakub Szefer. 2015. Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors. Springer Berlin Heidelberg Berlin Heidelberg 489--496.","DOI":"10.1007\/978-3-662-47854-7_30"},{"key":"e_1_3_2_1_16_1","unstructured":"Hristo Bojinov Yan Michalevsky Gabi Nakibly and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv.1408.1416 (2014).  Hristo Bojinov Yan Michalevsky Gabi Nakibly and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv.1408.1416 (2014)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.39"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000010"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"volume-title":"Transient-based Identification of Wireless Sensor Nodes. In IPSN '09","year":"2009","author":"Danev Boris","key":"e_1_3_2_1_23_1"},{"volume-title":"Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses. In NDSS'16","year":"2016","author":"Das Anupam","key":"e_1_3_2_1_24_1"},{"volume-title":"AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. In NDSS'14","year":"2014","author":"Dey Sanorita","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2903150.2903484"},{"volume-title":"USENIX'15","year":"2015","author":"Guri Mordechai","key":"e_1_3_2_1_27_1"},{"volume-title":"Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information. In IEEE INFOCOM'18","author":"Hua J.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818032"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0027"},{"volume-title":"VLSI'04","author":"Lee J. W.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.66"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1002\/2017GL076042"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428065"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0018"},{"key":"e_1_3_2_1_37_1","unstructured":"Lukasz Olejnik. 2016. Report on Sensors APIs: privacy and transparency perspective. W3C Invited Expert.  Lukasz Olejnik. 2016. Report on Sensors APIs: privacy and transparency perspective. W3C Invited Expert."},{"key":"e_1_3_2_1_38_1","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","author":"Pedregosa Fabian","year":"2011","journal-title":"Journal of Machine Learning Research 12"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Anne Perrin and Martine Souques. 2013. Electromagnetic Fields Environment and Health. Springer Science & Business Media.  Anne Perrin and Martine Souques. 2013. Electromagnetic Fields Environment and Health. Springer Science & Business Media.","DOI":"10.1007\/978-2-8178-0363-0"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677972.2677999"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369033"},{"key":"e_1_3_2_1_42_1","unstructured":"Stuart J. Russell and Peter Norvig. 2016. Artificial Intelligence: A Modern Approach (3 ed.). Pearson Education.   Stuart J. Russell and Peter Norvig. 2016. Artificial Intelligence: A Modern Approach (3 ed.). Pearson Education."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1973009.1973111"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2014.2300139"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319726","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3319726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319726"}},"subtitle":["identifying mobile devices through electromagnetic emissions"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":44,"alternative-id":["10.1145\/3317549.3319726","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3319726","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}