{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:39Z","timestamp":1773511179456,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702451"],"award-info":[{"award-number":["61702451"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ZJNSF Grant","award":["LGG19F020020"],"award-info":[{"award-number":["LGG19F020020"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3321705.3329817","type":"proceedings-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T12:53:20Z","timestamp":1562676800000},"page":"283-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["MagAttack"],"prefix":"10.1145","author":[{"given":"Yushi","family":"Cheng","sequence":"first","affiliation":[{"name":"Zhejiang University &amp; Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China"}]},{"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University &amp; Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China"}]},{"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Hao","family":"Pan","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Zhuangdi","family":"Zhu","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, MI, USA"}]},{"given":"Chuang-Wen","family":"You","sequence":"additional","affiliation":[{"name":"National Taiwan University, Taipei, Taiwan Roc"}]},{"given":"Yi-Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}]},{"given":"Lili","family":"Qiu","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Multiresolution signal decomposition: transforms, subbands, and wavelets","author":"Akansu Ali N","unstructured":"Ali N Akansu and Richard A Haddad . 2001. Multiresolution signal decomposition: transforms, subbands, and wavelets . Academic Press . Ali N Akansu and Richard A Haddad. 2001. Multiresolution signal decomposition: transforms, subbands, and wavelets. Academic Press."},{"key":"e_1_3_2_1_2_1","unstructured":"Alexa. 2017. Top Sites in China. http:\/\/www.alexa.com\/topsites\/countries\/CN. (2017).  Alexa. 2017. Top Sites in China. http:\/\/www.alexa.com\/topsites\/countries\/CN. (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420957"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_30"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 6th USENIX conference on Hot Topics in Security (HotSec'11)","volume":"11","author":"Cai Liang","year":"2011","unstructured":"Liang Cai and Hao Chen . 2011 . Touch Logger: Inferring Keystrokes on Touch Screen from Smartphone Motion . In Proceedings of the 6th USENIX conference on Hot Topics in Security (HotSec'11) , Vol. 11 . 9--9. Liang Cai and Hao Chen. 2011. Touch Logger: Inferring Keystrokes on Touch Screen from Smartphone Motion. In Proceedings of the 6th USENIX conference on Hot Topics in Security (HotSec'11), Vol. 11. 9--9."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2015.7146508"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_39"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.119732"},{"key":"e_1_3_2_1_10_1","unstructured":"dtrace.org. 2017. About Dtrace. http:\/\/dtrace.org\/blogs\/about. (2017).  dtrace.org. 2017. About Dtrace. http:\/\/dtrace.org\/blogs\/about. (2017)."},{"key":"e_1_3_2_1_11_1","volume-title":"Gartner Says Worldwide Device Shipments Will Increase 2.1 Percent","year":"2018","unstructured":"Gartner. 2018. Gartner Says Worldwide Device Shipments Will Increase 2.1 Percent in 2018 . https:\/\/www.gartner.com\/newsroom\/id\/3849063. (2018). Gartner. 2018. Gartner Says Worldwide Device Shipments Will Increase 2.1 Percent in 2018. https:\/\/www.gartner.com\/newsroom\/id\/3849063. (2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-015-0100-7"},{"key":"e_1_3_2_1_14_1","unstructured":"Github. 2016. DTrace-win32. https:\/\/github.com\/prash-wghats\/DTrace-win32. (2016).  Github. 2016. DTrace-win32. https:\/\/github.com\/prash-wghats\/DTrace-win32. (2016)."},{"key":"e_1_3_2_1_15_1","unstructured":"Gregose. 2016. Syscall-table. http:\/\/syscalls.kernelgrok.com\/. (2016).  Gregose. 2016. Syscall-table. http:\/\/syscalls.kernelgrok.com\/. (2016)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864375"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888881.1888898"},{"key":"e_1_3_2_1_20_1","volume-title":"Digital spectral analysis: with applications","author":"Marple S Lawrence","unstructured":"S Lawrence Marple . 1987. Digital spectral analysis: with applications . Vol. 5 . Prentice-Hall Englewood Cliffs , NJ. S Lawrence Marple. 1987. Digital spectral analysis: with applications. Vol. 5. Prentice-Hall Englewood Cliffs, NJ."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.27"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11)","volume":"11","author":"Schlegel Roman","year":"2011","unstructured":"Roman Schlegel , Kehuan Zhang , Xiao-yong Zhou, Mehool Intwala , Apu Kapadia , and XiaoFeng Wang . 2011 . Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones . In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11) , Vol. 11 . 17--33. Roman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, and XiaoFeng Wang. 2011. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11), Vol. 11. 17--33."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/110316.149352"},{"key":"e_1_3_2_1_24_1","volume-title":"Mac OS X internals: a systems approach","author":"Singh Amit","unstructured":"Amit Singh . 2006. Mac OS X internals: a systems approach . Addison-Wesley Professional . Amit Singh. 2006. Mac OS X internals: a systems approach. Addison-Wesley Professional."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520658"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804271"},{"key":"e_1_3_2_1_27_1","unstructured":"Wikipedia. 2017. CMOS. https:\/\/en.wikipedia.org\/wiki\/CMOS. (2017).  Wikipedia. 2017. CMOS. https:\/\/en.wikipedia.org\/wiki\/CMOS. (2017)."},{"key":"e_1_3_2_1_28_1","unstructured":"Wikipedia. 2017. k-nearest neighbors algorithm. https:\/\/en.wikipedia.org\/wiki\/ K-nearest_neighbors_algorithm. (2017).  Wikipedia. 2017. k-nearest neighbors algorithm. https:\/\/en.wikipedia.org\/wiki\/ K-nearest_neighbors_algorithm. (2017)."},{"key":"e_1_3_2_1_29_1","volume-title":"Principal component analysis. Chemometrics and intelligent laboratory systems 2, 1--3","author":"Esbensen Kim","year":"1987","unstructured":"SvanteWold, Kim Esbensen , and Paul Geladi . 1987. Principal component analysis. Chemometrics and intelligent laboratory systems 2, 1--3 ( 1987 ), 37--52. SvanteWold, Kim Esbensen, and Paul Geladi. 1987. Principal component analysis. Chemometrics and intelligent laboratory systems 2, 1--3 (1987), 37--52."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514285"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370380"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660296"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"}],"event":{"name":"Asia CCS '19: ACM Asia Conference on Computer and Communications Security","location":"Auckland New Zealand","acronym":"Asia CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329817","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321705.3329817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:39Z","timestamp":1750204479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329817"}},"subtitle":["Guessing Application Launching and Operation via Smartphone"],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":33,"alternative-id":["10.1145\/3321705.3329817","10.1145\/3321705"],"URL":"https:\/\/doi.org\/10.1145\/3321705.3329817","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}