{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T07:19:02Z","timestamp":1757575142540,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000332","name":"Royal Society of Edinburgh","doi-asserted-by":"publisher","award":["65040"],"award-info":[{"award-number":["65040"]}],"id":[{"id":"10.13039\/501100000332","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["316457582 and AL 1899\/2-1"],"award-info":[{"award-number":["316457582 and AL 1899\/2-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1145\/3399715.3399819","type":"proceedings-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T23:52:29Z","timestamp":1601682749000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Are Thermal Attacks Ubiquitous?"],"prefix":"10.1145","author":[{"given":"Yasmeen","family":"Abdrabou","sequence":"first","affiliation":[{"name":"Bundeswehr University Munich"}]},{"given":"Yomna","family":"Abdelrahman","sequence":"additional","affiliation":[{"name":"Bundeswehr University Munich"}]},{"given":"Ahmed","family":"Ayman","sequence":"additional","affiliation":[{"name":"German University in Cairo"}]},{"given":"Amr","family":"Elmougy","sequence":"additional","affiliation":[{"name":"German University in Cairo"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow"}]}],"member":"320","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"#cr-split#-e_1_3_2_1_1_1.1","doi-asserted-by":"crossref","unstructured":"Yomna Abdelrahman Mohamed Khamis Stefan Schneegass and Florian Alt. 2017. Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication (CHI '17). ACM New York NY USA 3751--3763. https:\/\/doi.org\/10.1145\/3025453.3025461 10.1145\/3025453.3025461","DOI":"10.1145\/3025453.3025461"},{"key":"#cr-split#-e_1_3_2_1_1_1.2","doi-asserted-by":"crossref","unstructured":"Yomna Abdelrahman Mohamed Khamis Stefan Schneegass and Florian Alt. 2017. Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication (CHI '17). ACM New York NY USA 3751--3763. https:\/\/doi.org\/10.1145\/3025453.3025461","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_2_1_2_1","volume-title":"Investigation of Material Properties for Thermal Imaging-Based Interaction (CHI '15)","author":"Abdelrahman Yomna","year":"2015","unstructured":"Yomna Abdelrahman , Alireza Sahami Shirazi , Niels Henze , and Albrecht Schmidt . 2015 . Investigation of Material Properties for Thermal Imaging-Based Interaction (CHI '15) . ACM, New York, NY, USA, 15--18. https:\/\/doi.org\/10.1145\/2702123.2702290 10.1145\/2702123.2702290 Yomna Abdelrahman, Alireza Sahami Shirazi, Niels Henze, and Albrecht Schmidt. 2015. Investigation of Material Properties for Thermal Imaging-Based Interaction (CHI '15). ACM, New York, NY, USA, 15--18. https:\/\/doi.org\/10.1145\/2702123.2702290"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785882"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462098"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"key":"e_1_3_2_1_6_1","volume-title":"Smith","author":"Aviv Adam J.","year":"2010","unstructured":"Adam J. Aviv , Katherine Gibson , Evan Mossop , Matt Blaze , and Jonathan M . Smith . 2010 . Smudge Attacks on Smartphone Touch Screens . (2010), 1--7. http:\/\/dl.acm.org\/citation.cfm?id=1925004.1925009 Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. 2010. Smudge Attacks on Smartphone Touch Screens. (2010), 1--7. http:\/\/dl.acm.org\/citation.cfm?id=1925004.1925009"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2012.06.005"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"volume-title":"Look into My Eyes!: Can You Guess My Password? (SOUPS '09). ACM","author":"Luca Alexander De","key":"e_1_3_2_1_10_1","unstructured":"Alexander De Luca , Martin Denzel , and Heinrich Hussmann . 2009. Look into My Eyes!: Can You Guess My Password? (SOUPS '09). ACM , New York, NY, USA , Article 7, 12 pages. https:\/\/doi.org\/10.1145\/1572532.1572542 10.1145\/1572532.1572542 Alexander De Luca, Martin Denzel, and Heinrich Hussmann. 2009. Look into My Eyes!: Can You Guess My Password? (SOUPS '09). ACM, New York, NY, USA, Article 7, 12 pages. https:\/\/doi.org\/10.1145\/1572532.1572542"},{"key":"e_1_3_2_1_11_1","volume-title":"Touch Me Once and I Know It's You!: Implicit Authentication Based on Touch Screen Patterns (CHI '12)","author":"Luca Alexander De","year":"2076","unstructured":"Alexander De Luca , Alina Hang , Frederik Brudy , Christian Lindner , and Heinrich Hussmann . 2012. Touch Me Once and I Know It's You!: Implicit Authentication Based on Touch Screen Patterns (CHI '12) . ACM , New York, NY, USA , 987--996. https:\/\/doi.org\/10.1145\/2 2076 76.2208544 10.1145\/2207676.2208544 Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, and Heinrich Hussmann. 2012. Touch Me Once and I Know It's You!: Implicit Authentication Based on Touch Screen Patterns (CHI '12). ACM, New York, NY, USA, 987--996. https:\/\/doi.org\/10.1145\/2207676.2208544"},{"key":"e_1_3_2_1_12_1","volume-title":"Heinrich Hussmann, and Matthew Smith.","author":"Luca Alexander De","year":"2014","unstructured":"Alexander De Luca , Marian Harbach , Emanuel von Zezschwitz , Max-Emanuel Maurer , Bernhard Ewald Slawik , Heinrich Hussmann, and Matthew Smith. 2014 . Now You See Me, Now You Don'T: Protecting Smartphone Authentication from Shoulder Surfers (CHI '14). ACM, New York, NY, USA , 2937--2946. https:\/\/doi.org\/10.1145\/2556288.2557097 10.1145\/2556288.2557097 Alexander De Luca, Marian Harbach, Emanuel von Zezschwitz, Max-Emanuel Maurer, Bernhard Ewald Slawik, Heinrich Hussmann, and Matthew Smith. 2014. Now You See Me, Now You Don'T: Protecting Smartphone Authentication from Shoulder Surfers (CHI '14). ACM, New York, NY, USA, 2937--2946. https:\/\/doi.org\/10.1145\/2556288.2557097"},{"volume-title":"Understanding Shoulder Surfing in the Wild: Stories from Users and Observers (CHI '17)","author":"Eiband Malin","key":"e_1_3_2_1_13_1","unstructured":"Malin Eiband , Mohamed Khamis , Emanuel von Zezschwitz , Heinrich Hussmann , and Florian Alt . 2017. Understanding Shoulder Surfing in the Wild: Stories from Users and Observers (CHI '17) . ACM , New York, NY, USA , 4254--4265. https:\/\/doi.org\/10.1145\/3025453.3025636 10.1145\/3025453.3025636 Malin Eiband, Mohamed Khamis, Emanuel von Zezschwitz, Heinrich Hussmann, and Florian Alt. 2017. Understanding Shoulder Surfing in the Wild: Stories from Users and Observers (CHI '17). ACM, New York, NY, USA, 4254--4265. https:\/\/doi.org\/10.1145\/3025453.3025636"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753491"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.83.2.314"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 8th Conference on USENIX Security Symposium -","volume":"8","author":"Jermyn Ian","unstructured":"Ian Jermyn , Alain Mayer , Fabian Monrose , Michael K. Reiter , and Aviel D. Rubin . 1999. The Design and Analysis of Graphical Passwords . In Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8 . USENIX Association, Berkeley, CA, USA, 1--1. http:\/\/dl.acm.org\/citation.cfm?id=1251421.1251422 Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter, and Aviel D. Rubin. 1999. The Design and Analysis of Graphical Passwords. In Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8. USENIX Association, Berkeley, CA, USA, 1--1. http:\/\/dl.acm.org\/citation.cfm?id=1251421.1251422"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329846"},{"key":"e_1_3_2_1_19_1","volume-title":"The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions. (CHI '20)","author":"Katsini Christina","year":"2020","unstructured":"Christina Katsini , Yasmeen Abdrabou , George Raptis , Mohamed Khamis , and Florian Alt . 2020 . The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions. (CHI '20) . ACM, New York, NY, USA. Christina Katsini, Yasmeen Abdrabou, George Raptis, Mohamed Khamis, and Florian Alt. 2020. The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions. (CHI '20). ACM, New York, NY, USA."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287052"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2868219"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025879"},{"key":"e_1_3_2_1_23_1","volume-title":"Heat of the Moment: Characterizing the Efficacy of Thermal Camera-based Attacks (WOOT'11)","author":"Mowery Keaton","year":"2028","unstructured":"Keaton Mowery , Sarah Meiklejohn , and Stefan Savage . 2011. Heat of the Moment: Characterizing the Efficacy of Thermal Camera-based Attacks (WOOT'11) . USENIX Association , Berkeley, CA, USA , 6--6. http:\/\/dl.acm.org\/citation.cfm?id= 2028 052.2028058 Keaton Mowery, Sarah Meiklejohn, and Stefan Savage. 2011. Heat of the Moment: Characterizing the Efficacy of Thermal Camera-based Attacks (WOOT'11). USENIX Association, Berkeley, CA, USA, 6--6. http:\/\/dl.acm.org\/citation.cfm?id=2028052.2028058"},{"key":"#cr-split#-e_1_3_2_1_25_1.1","doi-asserted-by":"crossref","unstructured":"Volker Roth Kai Richter and Rene Freidinger. 2004. A PIN-entry Method Resilient Against Shoulder Surfing (CCS '04). ACM 236--245. https:\/\/doi.org\/10.1145\/1030083.1030116 10.1145\/1030083.1030116","DOI":"10.1145\/1030083.1030116"},{"key":"#cr-split#-e_1_3_2_1_25_1.2","doi-asserted-by":"crossref","unstructured":"Volker Roth Kai Richter and Rene Freidinger. 2004. A PIN-entry Method Resilient Against Shoulder Surfing (CCS '04). ACM 236--245. https:\/\/doi.org\/10.1145\/1030083.1030116","DOI":"10.1145\/1030083.1030116"},{"key":"e_1_3_2_1_26_1","volume-title":"SmudgeSafe: Geometric Image Transformations for Smudge-resistant User Authentication (UbiComp '14)","author":"Schneegass Stefan","year":"2048","unstructured":"Stefan Schneegass , Frank Steimle , Andreas Bulling , Florian Alt , and Albrecht Schmidt . 2014. SmudgeSafe: Geometric Image Transformations for Smudge-resistant User Authentication (UbiComp '14) . ACM , New York, NY, USA , 775--786. https:\/\/doi.org\/10.1145\/263 2048 .2636090 10.1145\/2632048.2636090 Stefan Schneegass, Frank Steimle, Andreas Bulling, Florian Alt, and Albrecht Schmidt. 2014. SmudgeSafe: Geometric Image Transformations for Smudge-resistant User Authentication (UbiComp '14). ACM, New York, NY, USA, 775--786. https:\/\/doi.org\/10.1145\/2632048.2636090"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702212"},{"key":"e_1_3_2_1_28_1","volume-title":"Philipp Janssen, and Heinrich Hussmann.","author":"von Zezschwitz Emanuel","year":"2015","unstructured":"Emanuel von Zezschwitz , Alexander De Luca , Philipp Janssen, and Heinrich Hussmann. 2015 . Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)Lock Patterns (CHI '15). ACM, New York, NY, USA , 2339--2342. https:\/\/doi.org\/10.1145\/2702123.2702202 10.1145\/2702123.2702202 Emanuel von Zezschwitz, Alexander De Luca, Philipp Janssen, and Heinrich Hussmann. 2015. Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)Lock Patterns (CHI '15). ACM, New York, NY, USA, 2339--2342. https:\/\/doi.org\/10.1145\/2702123.2702202"},{"key":"e_1_3_2_1_29_1","volume-title":"Making Graphic-based Authentication Secure Against Smudge Attacks (IUI '13)","author":"von Zezschwitz Emanuel","year":"2013","unstructured":"Emanuel von Zezschwitz , Anton Koslow , Alexander De Luca , and Heinrich Hussmann . 2013 . Making Graphic-based Authentication Secure Against Smudge Attacks (IUI '13) . ACM, New York, NY, USA, 277--286. https:\/\/doi.org\/10.1145\/2449396.2449432 10.1145\/2449396.2449432 Emanuel von Zezschwitz, Anton Koslow, Alexander De Luca, and Heinrich Hussmann. 2013. Making Graphic-based Authentication Secure Against Smudge Attacks (IUI '13). ACM, New York, NY, USA, 277--286. https:\/\/doi.org\/10.1145\/2449396.2449432"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463160.1463202"},{"key":"e_1_3_2_1_31_1","volume-title":"Thermal Imaging Attacks on Keypad Security Systems (ICETE","author":"Wodo Wojciech","year":"2016","unstructured":"Wojciech Wodo and Lucjan Hanzlik . 2016. Thermal Imaging Attacks on Keypad Security Systems (ICETE 2016 ). SCITEPRESS - Science and Technology Publications , Lda, Portugal , 458--464. https:\/\/doi.org\/10.5220\/0005998404580464 10.5220\/0005998404580464 Wojciech Wodo and Lucjan Hanzlik. 2016. Thermal Imaging Attacks on Keypad Security Systems (ICETE 2016). SCITEPRESS - Science and Technology Publications, Lda, Portugal, 458--464. https:\/\/doi.org\/10.5220\/0005998404580464"},{"key":"e_1_3_2_1_32_1","volume-title":"Free-Form Gesture Authentication in the Wild (CHI '16)","author":"Yang Yulong","year":"2016","unstructured":"Yulong Yang , Gradeigh D. Clark , Janne Lindqvist , and Antti Oulasvirta . 2016 . Free-Form Gesture Authentication in the Wild (CHI '16) . ACM, New York, NY, USA, 3722--3735. https:\/\/doi.org\/10.1145\/2858036.2858270 10.1145\/2858036.2858270 Yulong Yang, Gradeigh D. Clark, Janne Lindqvist, and Antti Oulasvirta. 2016. Free-Form Gesture Authentication in the Wild (CHI '16). ACM, New York, NY, USA, 3722--3735. https:\/\/doi.org\/10.1145\/2858036.2858270"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230740"}],"event":{"name":"AVI '20: International Conference on Advanced Visual Interfaces","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Salerno Italy","acronym":"AVI '20"},"container-title":["Proceedings of the International Conference on Advanced Visual Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3399715.3399819","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3399715.3399819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:14Z","timestamp":1750199894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3399715.3399819"}},"subtitle":["When Non-Expert Attackers Use Off the shelf Thermal Cameras"],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":34,"alternative-id":["10.1145\/3399715.3399819","10.1145\/3399715"],"URL":"https:\/\/doi.org\/10.1145\/3399715.3399819","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]},"assertion":[{"value":"2020-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}