{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:32:52Z","timestamp":1776112372002,"version":"3.50.1"},"reference-count":104,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,12,17]],"date-time":"2020-12-17T00:00:00Z","timestamp":1608163200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006595","name":"Unitatea Executiva pentru Finantarea Invatamantului Superior, a Cercetarii, Dezvoltarii si Inovarii","doi-asserted-by":"publisher","award":["PN-III-P2-2.1-PED-2019-0352 (276PED\/2020)"],"award-info":[{"award-number":["PN-III-P2-2.1-PED-2019-0352 (276PED\/2020)"]}],"id":[{"id":"10.13039\/501100006595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2020,12,17]]},"abstract":"<jats:p>We address in this work security and privacy threats for connected camera glasses, for which very few investigations have been conducted so far, despite the considerable attention to understanding security concerns for other wearables, such as smartwatches and fitness trackers. To raise awareness about such threats, we present the results of a case study involving a low-cost spy camera glasses device, readily available on the market, that can be used to record and stream live video, for which we demonstrate infringement of several privacy requirements (regarding the camera glasses device itself, the data collected by the embedded video camera, the wearer of the device, and for bystanders as well) that lead to corresponding security threats (e.g., data confidentiality, integrity, availability, and access control). To foster replicability and reproducibility of our empirical results, investigation method, and implementation of attacks, we describe our case study in the form of a detailed activity log and release full C++ code implementing our approach. Furthermore, we present our findings to three IT security experts and summarize their recommendations for designing more secure connected camera glasses.<\/jats:p>","DOI":"10.1145\/3432700","type":"journal-article","created":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T15:39:14Z","timestamp":1608305954000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Uncovering Practical Security and Privacy Threats for Connected Glasses with Embedded Video Cameras"],"prefix":"10.1145","volume":"4","author":[{"given":"Octav","family":"Opaschi","sequence":"first","affiliation":[{"name":"MintViz Lab | MANSiD Center, University \u015etefan cel Mare of Suceava, Suceava, Romania, Detack GmbH, Ludwigsburg, Germany, DE"}]},{"given":"Radu-Daniel","family":"Vatavu","sequence":"additional","affiliation":[{"name":"MintViz Lab | MANSiD Center, University \u015etefan cel Mare of Suceava, Suceava, Romania"}]}],"member":"320","published-online":{"date-parts":[[2020,12,18]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411170.3411237"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAS49615.2020.9108915"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331157"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319499.3328234"},{"key":"e_1_2_2_5_1","volume-title":"d.]. Aircrack-ng. Retrieved","year":"2019"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3137616.3137617"},{"key":"e_1_2_2_7_1","volume-title":"Alfa Network AWUS1900 - Kali WiFi USB - Alfa Network Inc. Retrieved","author":"Alfa Network Inc. [n. d.].","year":"2019"},{"key":"e_1_2_2_8_1","unstructured":"Cristina Contero Almagro. 2019. Overview of the Main Implications for Data Protection of Smart Glasses on Occasion of the Publication of the First Technology Report (\"Smart glasses and Data Protection\") by the European Data Protection Supervisor. https:\/\/aphaia.co.uk\/en\/2019\/02\/01\/smart-glasses-and-data-protection\/.  Cristina Contero Almagro. 2019. Overview of the Main Implications for Data Protection of Smart Glasses on Occasion of the Publication of the First Technology Report (\"Smart glasses and Data Protection\") by the European Data Protection Supervisor. https:\/\/aphaia.co.uk\/en\/2019\/02\/01\/smart-glasses-and-data-protection\/."},{"key":"e_1_2_2_9_1","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"Anderson Ross","year":"2008","edition":"2"},{"key":"e_1_2_2_10_1","volume-title":"Designing Smartglasses Applications for People with Low Vision. SIGACCESS Access. Comput. 119 (Nov","author":"Azenkot Shiri","year":"2017"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0036"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300651"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.40"},{"key":"e_1_2_2_14_1","first-page":"5","article-title":"Security Flaws in 802.11 Data Link","volume":"46","author":"Cam-Winget Nancy","year":"2003","journal-title":"Protocols. Commun. ACM"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191737"},{"key":"e_1_2_2_16_1","unstructured":"European Commission. 2020. EU Data Protection Rules. https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection\/eu-data-protection-rules_en  European Commission. 2020. EU Data Protection Rules. https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection\/eu-data-protection-rules_en"},{"key":"e_1_2_2_17_1","unstructured":"European Commission. 2020. Proposal for an ePrivacy Regulation. https:\/\/ec.europa.eu\/digital-single-market\/en\/proposal-eprivacy-regulation  European Commission. 2020. Proposal for an ePrivacy Regulation. https:\/\/ec.europa.eu\/digital-single-market\/en\/proposal-eprivacy-regulation"},{"key":"e_1_2_2_18_1","volume-title":"d.]. About iw. Retrieved","author":"Wikipedia","year":"2019"},{"key":"e_1_2_2_19_1","volume-title":"d.]. Small Outline Integrated Circuit. Retrieved","author":"Wikipedia","year":"2019"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"e_1_2_2_21_1","volume-title":"Proc. of the 10th Int. Conf. for Internet Technology and Secured Transactions (ICITST '15)","author":"Delail B. A.","year":"2015"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611264.2611266"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557352"},{"key":"e_1_2_2_24_1","unstructured":"Robert Kaiser (Ed.). 2018. Proc. of WAMOS 2018 the 4th Wiesbaden Workshop on Advanced Microkernel Operating Systems. RheinMain University of Applied Sciences. https:\/\/www.cs.hs-rm.de\/~kaiser\/events\/wamos2018\/wamos18-proceedings.pdf  Robert Kaiser (Ed.). 2018. Proc. of WAMOS 2018 the 4th Wiesbaden Workshop on Advanced Microkernel Operating Systems. RheinMain University of Applied Sciences. https:\/\/www.cs.hs-rm.de\/~kaiser\/events\/wamos2018\/wamos18-proceedings.pdf"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702251"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_2_2_27_1","volume-title":"Proceedings of the 13th USENIX Conference on Usable Privacy and Security (SOUPS '17)","author":"Emami-Naeini Pardis","year":"2017"},{"key":"e_1_2_2_28_1","unstructured":"European Data Protection Supervisor. 2019. Tehnology Report No. 1: Smart Glasses and Data Protection. https:\/\/edps.europa.eu\/sites\/edp\/files\/publication\/19-01-18_edps-tech-report-1-smart_glasses_en.pdf.  European Data Protection Supervisor. 2019. Tehnology Report No. 1: Smart Glasses and Data Protection. https:\/\/edps.europa.eu\/sites\/edp\/files\/publication\/19-01-18_edps-tech-report-1-smart_glasses_en.pdf."},{"key":"e_1_2_2_29_1","volume-title":"ETSI EN 300 328 V1.9.1: Electromagnetic compatibility and Radio spectrum Matters (ERM)","author":"European Telecommunications Standards Institute"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2017.54"},{"key":"e_1_2_2_31_1","volume-title":"d.]. flashrom. Retrieved","year":"2019"},{"key":"e_1_2_2_32_1","volume-title":"d.]. libtins: C++ packet sniffing and crafting library. Retrieved","author":"Fontanini Matias","year":"2019"},{"key":"e_1_2_2_33_1","volume-title":"d.]. USB TTL serial. Retrieved","author":"Devices Int Future Technology","year":"2019"},{"key":"e_1_2_2_34_1","volume-title":"d.]. Binwalk. Retrieved","author":"Heffner Craig","year":"2019"},{"key":"e_1_2_2_35_1","unstructured":"Craig Heffner. 2013. Differentiate Encryption From Compression Using Math. http:\/\/www.devttys0.com\/2013\/06\/differentiate-encryption-from-compression-using-math\/  Craig Heffner. 2013. Differentiate Encryption From Compression Using Math. http:\/\/www.devttys0.com\/2013\/06\/differentiate-encryption-from-compression-using-math\/"},{"key":"e_1_2_2_36_1","unstructured":"Craig Heffner. 2013. Encryption vs Compression Part 2. http:\/\/www.devttys0.com\/2013\/06\/encryption-vs-compression-part-2\/  Craig Heffner. 2013. Encryption vs Compression Part 2. http:\/\/www.devttys0.com\/2013\/06\/encryption-vs-compression-part-2\/"},{"key":"e_1_2_2_37_1","volume-title":"d.]. Spy Camera Glasses with Video Support Up to 32GB TF Card 1080P Video Camera Glasses Portable Video Recorder. Retrieved","year":"2019"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702183"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632079"},{"key":"e_1_2_2_40_1","unstructured":"Jane C. Hu. 2018. How One Lightbulb Could Allow Hackers to Burgle Your Home. https:\/\/qz.com\/1493748\/how-one-lightbulb-could-allow-hackers-to-burgle-your-home\/.  Jane C. Hu. 2018. How One Lightbulb Could Allow Hackers to Burgle Your Home. https:\/\/qz.com\/1493748\/how-one-lightbulb-could-allow-hackers-to-burgle-your-home\/."},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3174910.3174936"},{"key":"e_1_2_2_42_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15)","author":"Jain Dhruv"},{"key":"e_1_2_2_43_1","volume-title":"Courteous Glass. In Proc. of the 2014 ACM Int. Joint Conf. on Pervasive and Ubiquitous Computing (UbiComp '14 Adjunct). ACM","author":"Jung Jaeyeon","year":"2014"},{"key":"e_1_2_2_44_1","volume-title":"Proceedings of WAMOS 2018, the 4th Wiesbaden Workshop on Advanced Microkernel Operating Systems, Robert Kaiser (Ed.). 27--33","author":"Karagiozidis Alexios","year":"2018"},{"key":"e_1_2_2_45_1","unstructured":"Kaspersky. 2016. 1 in 4 Wi-Fi Hotspots Just Waiting to Be Hacked Kaspersky Lab Stats Show. https:\/\/www.kaspersky.com\/about\/press-releases\/2016_1-in-4-wi-fi-hotspots-just-waiting-to-be-hacked-kaspersky-lab-stats-show.  Kaspersky. 2016. 1 in 4 Wi-Fi Hotspots Just Waiting to Be Hacked Kaspersky Lab Stats Show. https:\/\/www.kaspersky.com\/about\/press-releases\/2016_1-in-4-wi-fi-hotspots-just-waiting-to-be-hacked-kaspersky-lab-stats-show."},{"key":"e_1_2_2_46_1","unstructured":"Kaspersky. 2016. Consumer Security Risks Survey 2016: Connected but Not Protected. https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/45\/2018\/03\/08233604\/B2C_survey_2016_report.pdf.  Kaspersky. 2016. Consumer Security Risks Survey 2016: Connected but Not Protected. https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/45\/2018\/03\/08233604\/B2C_survey_2016_report.pdf."},{"key":"e_1_2_2_47_1","volume-title":"CyberSecurity - Complexity Risk. Retrieved","author":"King Norman","year":"2019"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240167.3240174"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785842"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173225.3173234"},{"key":"e_1_2_2_51_1","unstructured":"Aaron Kraus. 2019. New Security Risks Posed by Wearables & IoT. https:\/\/zeguro.com\/blog\/new-security-risks-posed-by-wearables-iot.  Aaron Kraus. 2019. New Security Risks Posed by Wearables & IoT. https:\/\/zeguro.com\/blog\/new-security-risks-posed-by-wearables-iot."},{"key":"e_1_2_2_52_1","volume-title":"Smart Eyewear, AR and VR Headsetss. In Photonics Applications for Aviation, Aerospace, Commercial, and Harsh Environments V","author":"Kress Bernard","year":"2064"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1959826.1959857"},{"key":"e_1_2_2_54_1","volume-title":"Wearables: A First Step Toward Personal Perception Enhancement. In Personal Assistants: Emerging Computational Technologies","author":"Lee H.","year":"2018"},{"key":"e_1_2_2_55_1","volume-title":"d.]. LFHMLF HD Spy Hidden Camera Glasses Nanny Cam Loop Video Recorder. Retrieved","author":"LFHMLF.","year":"2019"},{"key":"e_1_2_2_56_1","volume-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS '17). ACM","author":"Li Yan"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212498"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661334.2661400"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702188"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2942417"},{"key":"e_1_2_2_61_1","unstructured":"Maxim Integrated Products Inc. 2009. Reading and Writing 1-Wire Devices Through Serial Interfaces. Retrieved September 8 2019 from https:\/\/www.maximintegrated.com\/en\/app-notes\/index.mvp\/id\/74  Maxim Integrated Products Inc. 2009. Reading and Writing 1-Wire Devices Through Serial Interfaces. Retrieved September 8 2019 from https:\/\/www.maximintegrated.com\/en\/app-notes\/index.mvp\/id\/74"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741657"},{"key":"e_1_2_2_63_1","volume-title":"Hacking Into Your Account is as Easy as 123456. Retrieved","author":"Melanson Mike","year":"2019"},{"key":"e_1_2_2_64_1","volume-title":"Designing wearable technologies for users with disabilities: Accessibility, usability, and connectivity factors. Journal of Rehabilitation and Assistive Technologies Engineering 6","author":"Moon Nathan W.","year":"2019"},{"key":"e_1_2_2_65_1","volume-title":"A survey of diminished reality: Techniques for visually concealing, eliminating, and seeing through real objects. IPSJ Trans. on Computer Vision and Applications (Dec","author":"Mori Shohei","year":"2017"},{"key":"e_1_2_2_66_1","volume-title":"The Con: How Scams Work, Why You're Vulnerable, and How to Protect Yourself","author":"Munton James","year":"2011"},{"key":"e_1_2_2_67_1","volume-title":"Proc. of the 10th ACM Conf. on Embedded Network Sensor Systems (SenSys '12)","author":"M."},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39479-9_33"},{"key":"e_1_2_2_69_1","volume-title":"Glasses Camera. Retrieved","year":"2019"},{"key":"e_1_2_2_70_1","volume-title":"d.]. WIFI Glasses Camera. Retrieved","year":"2019"},{"key":"e_1_2_2_71_1","unstructured":"Dave Null. 2019. How To Do Firmware Analysis. Tools Tips and Tricks. https:\/\/www.pentestpartners.com\/security-blog\/how-to-do-firmware-analysis-tools-tips-and-tricks\/  Dave Null. 2019. How To Do Firmware Analysis. Tools Tips and Tricks. https:\/\/www.pentestpartners.com\/security-blog\/how-to-do-firmware-analysis-tools-tips-and-tricks\/"},{"key":"e_1_2_2_72_1","volume-title":"Proc. of the 2016 CHI Conf. on Human Factors in Computing Systems (CHI '16)","author":"Profita Halley"},{"key":"e_1_2_2_73_1","unstructured":"Puya Semiconductor. 2018. P25Q16H Datasheet. Retrieved September 8 2019 from http:\/\/www.puyasemi.com\/uploadfiles\/2018\/08\/20180807152503253.pdf  Puya Semiconductor. 2018. P25Q16H Datasheet. Retrieved September 8 2019 from http:\/\/www.puyasemi.com\/uploadfiles\/2018\/08\/20180807152503253.pdf"},{"key":"e_1_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980115.2980131"},{"key":"e_1_2_2_75_1","unstructured":"Research and Markets. 2020. Disposable Medical Sensors - A Global Market Overview. https:\/\/www.researchandmarkets.com\/reports\/5014114\/disposable-medical-sensors-a-global-market?utm_source=dynamic&utm_medium=GNOM&utm_code=slltr5&utm_campaign=1379192+-+Global+Market+Overview+on+Disposable+Medical+Sensors+(2019+to+2026)+-+Featuring+Abbott%2c+Broadcom+%26+First+Sensor+Among+Others&utm_exec=jamu273gnomd  Research and Markets. 2020. Disposable Medical Sensors - A Global Market Overview. https:\/\/www.researchandmarkets.com\/reports\/5014114\/disposable-medical-sensors-a-global-market?utm_source=dynamic&utm_medium=GNOM&utm_code=slltr5&utm_campaign=1379192+-+Global+Market+Overview+on+Disposable+Medical+Sensors+(2019+to+2026)+-+Featuring+Abbott%2c+Broadcom+%26+First+Sensor+Among+Others&utm_exec=jamu273gnomd"},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580723.2580730"},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/EHB47216.2019.8970074"},{"key":"e_1_2_2_78_1","first-page":"109","article-title":"Improving Google Glass security and privacy by changing the physical and software structure","volume":"11","author":"Safavi Seyedmostafa","year":"2014","journal-title":"Life Science Journal"},{"key":"e_1_2_2_79_1","volume-title":"RTP: A Transport Protocol for Real-Time Applications. Retrieved","author":"Schulzrinne H.","year":"2003"},{"key":"e_1_2_2_80_1","first-page":"10","volume-title":"An Offensive and Defensive Exposition of Wearable Computing. ACM Comput. Surv. 50","author":"Shrestha Prakash","year":"2017"},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167214"},{"key":"e_1_2_2_82_1","volume-title":"d.]. Spectacles by Snapchat. Capture Your World in 3D. Retrieved","year":"2019"},{"key":"e_1_2_2_83_1","volume-title":"Retrieved","year":"2017"},{"key":"e_1_2_2_84_1","volume-title":"Retrieved","year":"2018"},{"key":"e_1_2_2_85_1","volume-title":"Smart Augmented Reality Glasses Unit Shipments Worldwide from 2016 to 2022 (in 1,000s). Retrieved","year":"2019"},{"key":"e_1_2_2_86_1","volume-title":"Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS '17)","author":"Stearns Lee"},{"key":"e_1_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319913"},{"key":"e_1_2_2_88_1","unstructured":"Mano ten Napel. 2014. Wearables and Quantified Self Demand Security-First Design. https:\/\/www.wired.com\/insights\/2014\/10\/wearables-security-first-design\/  Mano ten Napel. 2014. Wearables and Quantified Self Demand Security-First Design. https:\/\/www.wired.com\/insights\/2014\/10\/wearables-security-first-design\/"},{"key":"e_1_2_2_89_1","volume-title":"Proceedings of the Int. Workshop on Information Security Applications (WISA '07)","volume":"2259","author":"Tews Erik","year":"2001"},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"key":"e_1_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243807"},{"key":"e_1_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428361.3428467"},{"key":"e_1_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897847"},{"key":"e_1_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"e_1_2_2_95_1","volume-title":"50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them","author":"Weisman Steve","edition":"2"},{"key":"e_1_2_2_96_1","volume-title":"d.]. WiGLE: Wireless Network Mapping. Retrieved","year":"2020"},{"key":"e_1_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702316"},{"key":"e_1_2_2_98_1","volume-title":"d.]. Wireshark. Go Deep. Retrieved","year":"2019"},{"key":"e_1_2_2_99_1","unstructured":"XR Access. [n.d.]. Home | XR Access Initiative. https:\/\/xraccess.org\/  XR Access. [n.d.]. Home | XR Access Initiative. https:\/\/xraccess.org\/"},{"key":"e_1_2_2_100_1","volume-title":"d.]. FHD 1080P Wearable Camera with Video Recording Mini Spy Camera Sunglasses. Retrieved","year":"2019"},{"key":"e_1_2_2_101_1","volume-title":"Super Small Surveillance Spy Camera Glasses. Retrieved","year":"2019"},{"key":"e_1_2_2_102_1","unstructured":"Qinggang Yue Zhen Ling Xinwen Fu Benyuan Liu Wei Yu and Wei Zhao. 2014. My Google Glass Sees Your Passwords! (Black Hat USA 2014 White paper). https:\/\/docs.huihoo.com\/blackhat\/usa-2014\/us-14-Fu-My-Google-Glass-Sees-Your-Passwords-WP.pdf  Qinggang Yue Zhen Ling Xinwen Fu Benyuan Liu Wei Yu and Wei Zhao. 2014. My Google Glass Sees Your Passwords! (Black Hat USA 2014 White paper). https:\/\/docs.huihoo.com\/blackhat\/usa-2014\/us-14-Fu-My-Google-Glass-Sees-Your-Passwords-WP.pdf"},{"key":"e_1_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078844"},{"key":"e_1_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376516"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3432700","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3432700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:11Z","timestamp":1750193231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3432700"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,17]]},"references-count":104,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12,17]]}},"alternative-id":["10.1145\/3432700"],"URL":"https:\/\/doi.org\/10.1145\/3432700","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,17]]},"assertion":[{"value":"2020-12-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}