{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T21:49:59Z","timestamp":1767908999114,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Air Force Research Laboratory (AFRL)"},{"name":"Defense Advanced Research Project Agency (DARPA)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359816","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"776-787","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Robust keystroke transcription from the acoustic side-channel"],"prefix":"10.1145","author":[{"given":"David","family":"Slater","sequence":"first","affiliation":[{"name":"Two Six Labs, LLC"}]},{"given":"Scott","family":"Novotney","sequence":"additional","affiliation":[{"name":"Two Six Labs, LLC"}]},{"given":"Jessica","family":"Moore","sequence":"additional","affiliation":[{"name":"Two Six Labs, LLC"}]},{"given":"Sean","family":"Morgan","sequence":"additional","affiliation":[{"name":"Two Six Labs, LLC"}]},{"given":"Scott","family":"Tenaglia","sequence":"additional","affiliation":[{"name":"Two Six Labs, LLC"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790109"},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on Machine Learning. 173--182","author":"Amodei Dario","year":"2016"},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 346--364","author":"Abhishek Anand S","year":"2016"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. ACM, 103--110","author":"Abhishek Anand S","year":"2018"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"key":"e_1_3_2_1_7_1","unstructured":"Sung-Hyuk Cha Charles Tappert and Mary Villani. [n. d.]. Keystroke Biometric Identification and Authentication on Long-Text Input. ([n. d.]).  Sung-Hyuk Cha Charles Tappert and Mary Villani. [n. d.]. Keystroke Biometric Identification and Authentication on Long-Text Input. ([n. d.])."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Ciprian Chelba Tomas Mikolov Mike Schuster Qi Ge Thorsten Brants Phillipp Koehn and Tony Robinson. 2013. One billion word benchmark for measuring progress in statistical language modeling. arXiv preprint arXiv:1312.3005 (2013).  Ciprian Chelba Tomas Mikolov Mike Schuster Qi Ge Thorsten Brants Phillipp Koehn and Tony Robinson. 2013. One billion word benchmark for measuring progress in statistical language modeling. arXiv preprint arXiv:1312.3005 (2013).","DOI":"10.21437\/Interspeech.2014-564"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1006\/csla.1999.0128"},{"key":"e_1_3_2_1_10_1","unstructured":"Junyoung Chung Caglar Gulcehre KyungHyun Cho and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014).  Junyoung Chung Caglar Gulcehre KyungHyun Cho and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053005"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243755"},{"key":"e_1_3_2_1_13_1","first-page":"76","article-title":"Tempest: A signal problem","volume":"35","author":"Friedman Jeffrey","year":"1972","journal-title":"NSA Cryptologic Spectrum"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143891"},{"key":"e_1_3_2_1_15_1","volume-title":"International conference on machine learning. 1764--1772","author":"Graves Alex","year":"2014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0264-7"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the sixth workshop on statistical machine translation. Association for Computational Linguistics, 187--197","author":"Heafield Kenneth","year":"2011"},{"key":"e_1_3_2_1_18_1","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167 (2015).  Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167 (2015)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790122"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.7296341"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274754"},{"key":"e_1_3_2_1_23_1","unstructured":"Paul Mermelstein. 1976. Distance measures for speech recognition psychological and instrumental. Pattern recognition and artificial intelligence 116 (1976) 374--388.  Paul Mermelstein. 1976. Distance measures for speech recognition psychological and instrumental. Pattern recognition and artificial intelligence 116 (1976) 374--388."},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security Symposium. 1053--1067","author":"Michalevsky Yan","year":"2014"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"John Monaco. 2018. SoK: Keylogging Side Channels. In IEEE Security & Privacy. IEEE.  John Monaco. 2018. SoK: Keylogging Side Channels. In IEEE Security & Privacy. IEEE.","DOI":"10.1109\/SP.2018.00026"},{"key":"e_1_3_2_1_26_1","unstructured":"John V Monaco and Charles C Tappert. 2016. Obfuscating keystroke time intervals to avoid identification and impersonation. arXiv preprint arXiv:1609.07612 (2016).  John V Monaco and Charles C Tappert. 2016. Obfuscating keystroke time intervals to avoid identification and impersonation. arXiv preprint arXiv:1609.07612 (2016)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3104322.3104425"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613015"},{"key":"e_1_3_2_1_29_1","volume-title":"KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks. In Network and Distributed System Security Symposium (NDSS).","author":"Schwarz Michael","year":"2018"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996259"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594384"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472778"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660296"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359816","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":35,"alternative-id":["10.1145\/3359789.3359816","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359816","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}