{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:10:10Z","timestamp":1750201810404,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380108","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"212-223","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices"],"prefix":"10.1145","author":[{"given":"Chris Xiaoxuan","family":"Lu","sequence":"first","affiliation":[{"name":"University of Liverpool"}]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[{"name":"New York University"}]},{"given":"Yuanbo","family":"Xiangli","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Zhengxiong","family":"Li","sequence":"additional","affiliation":[{"name":"University at Buffalo SUNY"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Ralink RT5572. https:\/\/wikidevi.com\/wiki\/Ralink_RT5572.  2016. Ralink RT5572. https:\/\/wikidevi.com\/wiki\/Ralink_RT5572."},{"key":"e_1_3_2_1_2_1","unstructured":"2016. Raspberry Pi Camera Module. https:\/\/www.raspberrypi.org\/products\/camera-module-v2\/.  2016. Raspberry Pi Camera Module. https:\/\/www.raspberrypi.org\/products\/camera-module-v2\/."},{"volume-title":"Guidelines for Use Organizationally Unique Identifier","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"2018. Raspberry Pi 3. https:\/\/www.raspberrypi.org\/products\/raspberry-pi-3-model-b-plus\/.  2018. Raspberry Pi 3. https:\/\/www.raspberrypi.org\/products\/raspberry-pi-3-model-b-plus\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2019. MATRIX Ecosystem. https:\/\/matrix-io.github.io\/matrix-documentation\/.  2019. MATRIX Ecosystem. https:\/\/matrix-io.github.io\/matrix-documentation\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.376"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906403"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2007.12"},{"volume-title":"USENIX Security symposium. 307\u2013322","year":"2010","author":"Backes Michael","key":"e_1_3_2_1_9_1"},{"volume-title":"Multiple-target tracking with radar applications","year":"1986","author":"Blackman S","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Max Burkhalter. 2019. Recent data leak highlights the importance of IoT back-end security. https:\/\/www.perle.com\/articles\/recent-data-leak-highlights-the-importance-of-iot-back-end-security-40185881.shtml.  Max Burkhalter. 2019. Recent data leak highlights the importance of IoT back-end security. https:\/\/www.perle.com\/articles\/recent-data-leak-highlights-the-importance-of-iot-back-end-security-40185881.shtml."},{"volume-title":"International Conference on Automatic Face and Gesture Recognition.","author":"Cao Q.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Claude Castelluccia. 2012. Behavioural tracking on the internet: a technical perspective. In European Data Protection: In Good Health?Springer 21\u201333.  Claude Castelluccia. 2012. Behavioural tracking on the internet: a technical perspective. In European Data Protection: In Good Health?Springer 21\u201333.","DOI":"10.1007\/978-94-007-2903-2_2"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866310"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"J.\u00a0S. Chung A. Nagrani and A. Zisserman. 2018. VoxCeleb2: Deep Speaker Recognition. In INTERSPEECH.  J.\u00a0S. Chung A. Nagrani and A. Zisserman. 2018. VoxCeleb2: Deep Speaker Recognition. In INTERSPEECH.","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/02602280810882535"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-013-0196-1"},{"volume-title":"International Conference on Smart Card Research and Advanced Applications. Springer, 167\u2013182","year":"1998","author":"Dhem Jean-Francois","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1590\/S1415-47571999000300024"},{"volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"Fan Junfeng","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148267"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2437652"},{"volume-title":"Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XVI, Vol.\u00a08017","author":"Hertenstein Jake","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.829274"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3137133.3137140"},{"key":"e_1_3_2_1_27_1","unstructured":"JLaservideo. 2018. DIY WIFI Spy Microphone Inside a Football. https:\/\/www.youtube.com\/watch?v=a8avue5cPFE.  JLaservideo. 2018. DIY WIFI Spy Microphone Inside a Football. https:\/\/www.youtube.com\/watch?v=a8avue5cPFE."},{"key":"e_1_3_2_1_28_1","first-page":"54","article-title":"Side channel attack-survey","volume":"1","author":"Joy\u00a0Persial G","year":"2011","journal-title":"Int J Adva Sci Res Rev"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501972"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/800057.808695"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176313"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2887322"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2389148.2389151"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1014"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274783.3274833"},{"volume-title":"Screenmilker: How to Milk Your Android Screen for Secrets.. In NDSS.","year":"2014","author":"Lin Chia-Chi","key":"e_1_3_2_1_36_1"},{"volume-title":"Armageddon: Cache attacks on mobile devices. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 549\u2013564.","year":"2016","author":"Lipp Moritz","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","unstructured":"Mark Loveless. 2017. BLUETOOTH HACKING TOOLS COMPARISON. https:\/\/duo.com\/decipher\/bluetooth-hacking-tools-comparison.  Mark Loveless. 2017. BLUETOOTH HACKING TOOLS COMPARISON. https:\/\/duo.com\/decipher\/bluetooth-hacking-tools-comparison."},{"key":"e_1_3_2_1_39_1","unstructured":"Z-Smart Systems\u00a0UK Ltd. 2018. Wireshark ZigBee Sniffer. https:\/\/www.cd-jackson.com\/downloads\/ZigBeeWiresharkSniffer.pdf.  Z-Smart Systems\u00a0UK Ltd. 2018. Wireshark ZigBee Sniffer. https:\/\/www.cd-jackson.com\/downloads\/ZigBeeWiresharkSniffer.pdf."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313398"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055031.3055073"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2926645"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2016.7763228"},{"key":"e_1_3_2_1_44_1","unstructured":"Alex Marthews and Catherine\u00a0E Tucker. 2017. Government surveillance and internet search behavior. Available at SSRN 2412564(2017).  Alex Marthews and Catherine\u00a0E Tucker. 2017. Government surveillance and internet search behavior. Available at SSRN 2412564(2017)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0054"},{"key":"e_1_3_2_1_46_1","first-page":"2017","article-title":"Gartner says 8.4 billion connected \u201cThings\u201d will be in use in 2017 up 31 percent from 2016","volume":"7","author":"van\u00a0der Meulen Rob","year":"2017","journal-title":"Gartner. Letzte Aktualisierung"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Savvas Papaioannou Hongkai Wen Zhuoling Xiao Andrew Markham and Niki Trigoni. 2015. Accurate Positioning via Cross-Modality Training. In ACM SenSys.  Savvas Papaioannou Hongkai Wen Zhuoling Xiao Andrew Markham and Niki Trigoni. 2015. Accurate Positioning via Cross-Modality Training. In ACM SenSys.","DOI":"10.1145\/2809695.2809712"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090743"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634531"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3068335"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2779824"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1748-720X.1997.tb01885.x"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_58_1","unstructured":"FindLaw\u2019s team. 2018. Are Hidden Cameras at Work Legal?https:\/\/employment.findlaw.com\/workplace-privacy\/are-hidden-cameras-at-work-legal-.html.  FindLaw\u2019s team. 2018. Are Hidden Cameras at Work Legal?https:\/\/employment.findlaw.com\/workplace-privacy\/are-hidden-cameras-at-work-legal-.html."},{"volume-title":"Ev-loc: integrating electronic and visual signals for accurate localization","year":"2014","author":"Teng Jin","key":"e_1_3_2_1_59_1"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897883"},{"key":"e_1_3_2_1_61_1","unstructured":"WifiNigel. 2018. Randomized MAC addresses in 802.11 Probe Frames. http:\/\/wifinigel.blogspot.com\/2018\/04\/to-address-perceived-privacy-issues.html.  WifiNigel. 2018. Randomized MAC addresses in 802.11 Probe Frames. http:\/\/wifinigel.blogspot.com\/2018\/04\/to-address-perceived-privacy-issues.html."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341162.3344858"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052620"},{"key":"e_1_3_2_1_64_1","unstructured":"Ting-Fang Yen Yinglian Xie Fang Yu Roger\u00a0Peng Yu and Martin Abadi. 2012. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.. In NDSS Vol.\u00a062. 66.  Ting-Fang Yen Yinglian Xie Fang Yu Roger\u00a0Peng Yu and Martin Abadi. 2012. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.. In NDSS Vol.\u00a062. 66."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"}],"event":{"name":"WWW '20: The Web Conference 2020","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Taipei Taiwan","acronym":"WWW '20"},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380108","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:59Z","timestamp":1750199579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":65,"alternative-id":["10.1145\/3366423.3380108","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380108","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}