{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:54:57Z","timestamp":1773510897708,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"China NSFC Grant","award":["62071428,61925109,61941120"],"award-info":[{"award-number":["62071428,61925109,61941120"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485389","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"1915-1929","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["CapSpeaker: Injecting Voices to Microphones via Capacitors"],"prefix":"10.1145","author":[{"given":"Xiaoyu","family":"Ji","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Juchuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Shui","family":"Jiang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Jishen","family":"Li","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23362"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security 19)","author":"Batina Lejla","year":"2019","unstructured":"Lejla Batina, Shivam Bhasin, Dirmanto Jap, and Stjepan Picek. 2019. CSINN : Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. In Proceedings of the 28th USENIX Security Symposium (USENIX Security 19). 515--532."},{"key":"e_1_3_2_1_3_1","volume-title":"Valericu a B\u00eendar, and Octavian Fratu","author":"Boitan Alexandru","year":"2020","unstructured":"Alexandru Boitan, Simona Halunga, Valericu a B\u00eendar, and Octavian Fratu. 2020. Compromising Electromagnetic Emanations of USB Mass Storage Devices. Wireless Personal Communications (April 2020)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00050"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of 25th USENIX Security Symposium (USENIX Security 16)","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden voice commands. In Proceedings of 25th USENIX Security Symposium (USENIX Security 16). 513--530."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 2017 IEEE International Conference on Big Data (Big Data ). 2980--2989","author":"Chakraborty S.","unstructured":"S. Chakraborty, W. Ouyang, and M. Srivastava. 2017. LightSpy : Optical Eavesdropping on Displays Using Light Sensors on Mobile Devices. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data ). 2980--2989."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196509"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329817"},{"key":"e_1_3_2_1_9_1","unstructured":"S. Knudtsen G. Shirn D. Burks R. Hofmaier. 1989. A ceramic capacitor for AC applications. (1989) 194--201."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384733"},{"key":"e_1_3_2_1_11_1","unstructured":"Facebook Twitter and LinkedIn. 2021. Did You Know This Many iPads Had Been Sold? https:\/\/www.lifewire.com\/how-many-ipads-sold-1994296 Section: Lifewire."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00074"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00074"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-015-0100-7"},{"key":"e_1_3_2_1_15_1","volume-title":"POWER -SUPPLaY : Leaking Data from Air -Gapped Systems by Turning the Power -Supplies Into Speakers. arXiv:2005.00395 [cs] (May","author":"Guri Mordechai","year":"2020","unstructured":"Mordechai Guri. 2020. POWER -SUPPLaY : Leaking Data from Air -Gapped Systems by Turning the Power -Supplies Into Speakers. arXiv:2005.00395 [cs] (May 2020). arxiv: 2005.00395"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of 24th USENIX Security Symposium (USENIX Security 15)","author":"Guri Mordechai","year":"2015","unstructured":"Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, and Yuval Elovici. 2015a. GSMem : Data Exfiltration from Air -Gapped Computers over GSM Frequencies. In Proceedings of 24th USENIX Security Symposium (USENIX Security 15) ."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906972"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.26"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2018.8625124"},{"key":"e_1_3_2_1_21_1","volume-title":"Exfiltrating Data from Air -Gapped Computers through Power Lines","author":"Guri Mordechai","year":"2019","unstructured":"Mordechai Guri, Boris Zadov, Dima Bykhovsky, and Yuval Elovici. 2019. PowerHammer : Exfiltrating Data from Air -Gapped Computers through Power Lines. IEEE Transactions on Information Forensics and Security (2019), 1--1."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2938404"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"J. Ho T. R. Jow and S. Boggs. 2010. Historical Introduction to Capacitor Technology. Vol. 26 1 (Jan. 2010) 20--25.","DOI":"10.1109\/MEI.2010.5383924"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/PHM.2015.7380064"},{"key":"e_1_3_2_1_26_1","first-page":"161","article-title":"Speech understanding in the elderly","volume":"7","author":"Humes Larry E","year":"1996","unstructured":"Larry E Humes. 1996. Speech understanding in the elderly. Journal-American Academy of Audiology , Vol. 7 (1996), 161--167.","journal-title":"Journal-American Academy of Audiology"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security . ACM, 146--162","author":"Mohammad","unstructured":"Mohammad A. Islam and Shaolei Ren. 2018. Ohm's Law in Data Centers : A Voltage Side Channel for Timing Power Attacks. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security . ACM, 146--162."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133994"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Dongjoon Kim Byung-Han Ko Sanggeuk Jeong No-Cheol Park and Young-Pil Park. 2015. Vibration reduction of MLCC considering piezoelectric and electrostriction effect. In Proceedings of 2015 Joint IEEE International Symposium on the Applications of Ferroelectric (ISAF) International Symposium on Integrated Functionalities (ISIF) and Piezoelectric Force Microscopy Workshop (PFM). IEEE 186--189.","DOI":"10.1109\/ISAF.2015.7172701"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00008"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_1_32_1","unstructured":"Stratistics Market Research Consulting Pvt Ltd. 2020. Multi-Layer Ceramic Capacitor - Global Market Outlook (2019--2027). (2020)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0025-y"},{"key":"e_1_3_2_1_34_1","unstructured":"MathWorks. 2021. Pulse Width Modulation - MATLAB & Simulink - MathWorks . https:\/\/www.mathworks.com\/help\/physmod\/sps\/pulse-width-modulation.html"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Roy Nirupam","year":"2018","unstructured":"Nirupam Roy, Sheng Shen, Haitham Hassanieh, and Romit Roy Choudhury. 2018. Inaudible voice commands: The long-range attack and defense. In Proceedings of 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18) . 547--560."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23288"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3393691.3394178"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0020"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2019.8825220"},{"key":"e_1_3_2_1_41_1","unstructured":"SIPI). IEEE 505--510."},{"key":"e_1_3_2_1_42_1","volume-title":"Dorf","author":"Svoboda James A.","year":"2013","unstructured":"James A. Svoboda and Richard C. Dorf. 2013. Introduction to Electric Circuits .John Wiley & Sons ."},{"key":"e_1_3_2_1_43_1","unstructured":"TDK. 2021. Measures Against Acoustic Noise in Power Inductors . https:\/\/product.tdk.com\/en\/techlibrary\/solutionguide\/acoustic-noise.html"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_3_2_1_45_1","unstructured":"Wikipedia contributors. 2021 a. Inductor. https:\/\/en.wikipedia.org\/wiki\/Inductor ."},{"key":"e_1_3_2_1_46_1","volume-title":"The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Young%27s_modulus&oldid=1039311706","author":"Wikipedia","unstructured":"Wikipedia contributors. 2021 b. Young's modulus -- Wikipedia, The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Young%27s_modulus&oldid=1039311706"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Lanqing Yang Honglu Li Zhaoxi Chen Xiaoyu Ji Yi-Chao Chen Guangtao Xue and Chuang-Wen You. 2020. Appliance fingerprinting using sound from power supply. (2020) 160--163.","DOI":"10.1145\/3410530.3414385"},{"key":"e_1_3_2_1_49_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Yuan Xuejing","year":"2018","unstructured":"Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, XiaoFeng Wang, and Carl A Gunter. 2018. Commandersong: A systematic approach for practical adversarial voice recognition. In 27th USENIX Security Symposium (USENIX Security 18). 49--64."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468291"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155386"},{"key":"e_1_3_2_1_53_1","volume-title":"Lianyong Qi, Hongli Nie, Wajid Rafique, and Wanchun Dou.","author":"Zhao Xuan","year":"2018","unstructured":"Xuan Zhao, Md Zakirul Alam Bhuiyan, Lianyong Qi, Hongli Nie, Wajid Rafique, and Wanchun Dou. 2018. TrCMP : An App Usage Inference Method for Mobile Service Enhancement. In Proceedings of Security, Privacy, and Anonymity in Computation , Communication, and Storage . Springer , 229--239."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196521"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485389","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:47:19Z","timestamp":1763498839000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":54,"alternative-id":["10.1145\/3460120.3485389","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485389","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}