{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:13Z","timestamp":1750220653581,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427279","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"706-716","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables"],"prefix":"10.1145","author":[{"given":"Prakash","family":"Shrestha","sequence":"first","affiliation":[{"name":"University of Florida, United States of America"}]},{"given":"Zengrui","family":"Liu","sequence":"additional","affiliation":[{"name":"The University of Alabama at Birmingham"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"The University of Alabama at Birmingham, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"volume-title":"WACA: Wearable-Assisted Continuous Authentication. arXiv preprint arXiv:1802.10417.","year":"2018","author":"Acar Abbas","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Mohammed AlZomai Bander AlFayyadh Audun J\u00f8sang and Adrian McCullagh. 2008. An exprimental investigation of the usability of transaction authorization in online bank security systems. (2008).  Mohammed AlZomai Bander AlFayyadh Audun J\u00f8sang and Adrian McCullagh. 2008. An exprimental investigation of the usability of transaction authorization in online bank security systems. (2008)."},{"volume-title":"https:\/\/goo.gl\/k37dLV. Accessed","year":"2018","author":"Apple Inc.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2017.8122765"},{"volume-title":"Accessed: 14th","year":"2017","author":"Blog Defense Intelligence","key":"e_1_3_2_1_5_1"},{"volume-title":"INTEGRIKEY: Integrity Protection of User Input for Remote Configuration of Safety-Critical Devices.","year":"2017","author":"Dhar Aritra","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"Duo Security Inc.2018. Duo Mobile: Duo Security. https:\/\/duo.com\/solutions\/features\/user-experience\/easy-authentication.  Duo Security Inc.2018. Duo Mobile: Duo Security. https:\/\/duo.com\/solutions\/features\/user-experience\/easy-authentication."},{"volume-title":"Firebase Cloud Messaging | Firebase. https:\/\/firebase.google.com\/docs\/cloud-messaging\/. Accessed","year":"2018","author":"Google Inc.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Google Inc.2018. Google 2-Step Verification. https:\/\/www.google.com\/landing\/2step\/.  Google Inc.2018. Google 2-Step Verification. https:\/\/www.google.com\/landing\/2step\/."},{"volume-title":"Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications.. In NDSS.","year":"2014","author":"Jang Yeongjin","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2014.14"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081351"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.51"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"volume-title":"Accessed","year":"2018","author":"Microsoft Inc.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2016.7581282"},{"key":"e_1_3_2_1_17_1","unstructured":"Nishkam Ravi Nikhil Dandekar Preetham Mysore and Michael\u00a0L Littman. 2005. Activity recognition from accelerometer data. In Aaai Vol.\u00a05. 1541\u20131546.  Nishkam Ravi Nikhil Dandekar Preetham Mysore and Michael\u00a0L Littman. 2005. Activity recognition from accelerometer data. In Aaai Vol.\u00a05. 1541\u20131546."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1326257.1326258"},{"key":"e_1_3_2_1_19_1","unstructured":"Shimmer Inc.2020. Wearable Sensor Technology | Wireless IMU | ECG | EMG | GSR. http:\/\/www.shimmersensing.com\/.  Shimmer Inc.2020. Wearable Sensor Technology | Wireless IMU | ECG | EMG | GSR. http:\/\/www.shimmersensing.com\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Sophos Ltd.2020. 13 years jail for bank robbers who used Trojan horse. https:\/\/nakedsecurity.sophos.com\/2009\/11\/16\/13-years-jail-bank-robbers-trojan-horse\/.  Sophos Ltd.2020. 13 years jail for bank robbers who used Trojan horse. https:\/\/nakedsecurity.sophos.com\/2009\/11\/16\/13-years-jail-bank-robbers-trojan-horse\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.28"},{"volume-title":"Accessed: 7th","year":"2020","author":"Test The\u00a0Practice","key":"e_1_3_2_1_22_1"},{"journal-title":"News.","year":"2017","author":"Hacker The","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WorldCIS17046.2011.5749897"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427279","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":24,"alternative-id":["10.1145\/3427228.3427279","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427279","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}