{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:46:21Z","timestamp":1765039581937,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2016K1A1A2912757"],"award-info":[{"award-number":["NRF-2016K1A1A2912757"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,15]]},"DOI":"10.1145\/3463676.3485607","type":"proceedings-article","created":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T22:07:38Z","timestamp":1636150058000},"page":"209-221","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals"],"prefix":"10.1145","author":[{"given":"\u00dclk\u00fc","family":"Meteriz-Y\u0131ld\u0131ran","sequence":"first","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Necip Fazil","family":"Yildiran","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"David","family":"Mohaisen","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"volume-title":"Trends, Forecasts (2020 -","year":"2025","key":"e_1_3_2_2_1_1","unstructured":"2020. Smartwatch Market - Growth , Trends, Forecasts (2020 - 2025 ). https:\/\/www.researchandmarkets.com\/reports\/4591978\/smartwatch-market- growth-trends-forecast 2020. Smartwatch Market - Growth, Trends, Forecasts (2020 - 2025). https:\/\/www.researchandmarkets.com\/reports\/4591978\/smartwatch-market- growth-trends-forecast"},{"key":"e_1_3_2_2_2_1","volume-title":"Watch Your Smartwatch. In 2018 International Conference on Computing Sciences and Engineering (ICCSE). 1--5. https:\/\/doi.org\/10","author":"Al-Sharrah Manal","year":"2018","unstructured":"Manal Al-Sharrah , Ayed Salman , and Imtiaz Ahmad . 2018 . Watch Your Smartwatch. In 2018 International Conference on Computing Sciences and Engineering (ICCSE). 1--5. https:\/\/doi.org\/10 .1109\/ICCSE1.2018.8374228 10.1109\/ICCSE1.2018.8374228 Manal Al-Sharrah, Ayed Salman, and Imtiaz Ahmad. 2018. Watch Your Smartwatch. In 2018 International Conference on Computing Sciences and Engineering (ICCSE). 1--5. https:\/\/doi.org\/10.1109\/ICCSE1.2018.8374228"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790109"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"e_1_3_2_2_5_1","volume-title":"Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. In 2015 10th International Conference on Availability, Reliability and Security. 303--311","author":"Baggili Ibrahim","year":"2015","unstructured":"Ibrahim Baggili , Jeff Oduro , Kyle Anthony , Frank Breitinger , and Glenn McGee . 2015 . Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. In 2015 10th International Conference on Availability, Reliability and Security. 303--311 . https:\/\/doi.org\/10.1109\/ARES.2015.39 10.1109\/ARES.2015.39 Ibrahim Baggili, Jeff Oduro, Kyle Anthony, Frank Breitinger, and Glenn McGee. 2015. Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. In 2015 10th International Conference on Availability, Reliability and Security. 303--311. https:\/\/doi.org\/10.1109\/ARES.2015.39"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.28"},{"key":"e_1_3_2_2_7_1","volume-title":"Sniffing Keystrokes With Lasers and Voltmeters. In In Proceedings of Black Hat USA.","author":"Bianco D.","year":"2009","unstructured":"Bianco D. Barisani A. 2009 . Sniffing Keystrokes With Lasers and Voltmeters. In In Proceedings of Black Hat USA. Bianco D. Barisani A. 2009. Sniffing Keystrokes With Lasers and Voltmeters. In In Proceedings of Black Hat USA."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341163.3347735"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742673"},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings ACM on Asia Conference on Computer and Communications Security (Abu Dhabi, United Arab Emirates). ACM","author":"Compagno Alberto","year":"2017","unstructured":"Alberto Compagno , Mauro Conti , Daniele Lain , and Gene Tsudik . 2017 . Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP . In Proceedings ACM on Asia Conference on Computer and Communications Security (Abu Dhabi, United Arab Emirates). ACM , New York, NY, USA, 703--715. https:\/\/doi.org\/10.1145\/3052973.3053005 10.1145\/3052973.3053005 Alberto Compagno, Mauro Conti, Daniele Lain, and Gene Tsudik. 2017. Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP. In Proceedings ACM on Asia Conference on Computer and Communications Security (Abu Dhabi, United Arab Emirates). ACM, New York, NY, USA, 703--715. https:\/\/doi.org\/10.1145\/3052973.3053005"},{"key":"e_1_3_2_2_12_1","unstructured":"Stanford Center for Digital Health and Rock Health. 2019. https:\/\/rockhealth.com\/reports\/digital-health-consumer-adoption-report-2019\/  Stanford Center for Digital Health and Rock Health. 2019. https:\/\/rockhealth.com\/reports\/digital-health-consumer-adoption-report-2019\/"},{"key":"e_1_3_2_2_13_1","first-page":"76","article-title":"Tempest: A signal problem","volume":"35","author":"Friedman Jeffrey","year":"1972","unstructured":"Jeffrey Friedman . 1972 . Tempest: A signal problem . NSA Cryptologic Spectrum , Vol. 35 (1972), 76 . Jeffrey Friedman. 1972. Tempest: A signal problem. NSA Cryptologic Spectrum, Vol. 35 (1972), 76.","journal-title":"NSA Cryptologic Spectrum"},{"volume-title":"WrisText: One-Handed Text Entry on Smartwatch Using Wrist Gestures .Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems","author":"Gong Jun","key":"e_1_3_2_2_14_1","unstructured":"Jun Gong , Zheer Xu , Qifan Guo , Teddy Seyed , Xiang ' Anthony' Chen , Xiaojun Bi , and Xing-Dong Yang . 2018. WrisText: One-Handed Text Entry on Smartwatch Using Wrist Gestures .Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems , New York, NY, USA , 1--14. https:\/\/doi.org\/10.1145\/3173574.3173755 10.1145\/3173574.3173755 Jun Gong, Zheer Xu, Qifan Guo, Teddy Seyed, Xiang 'Anthony' Chen, Xiaojun Bi, and Xing-Dong Yang. 2018. WrisText: One-Handed Text Entry on Smartwatch Using Wrist Gestures .Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, New York, NY, USA, 1--14. https:\/\/doi.org\/10.1145\/3173574.3173755"},{"volume-title":"Real-World Natural Language Processing: Practical applications with deep learning","author":"Hagiwara M.","key":"e_1_3_2_2_15_1","unstructured":"M. Hagiwara . 2021. Real-World Natural Language Processing: Practical applications with deep learning . Manning Publications . https:\/\/books.google.com.tr\/books?id=A92_zQEACAAJ M. Hagiwara. 2021. Real-World Natural Language Processing: Practical applications with deep learning. Manning Publications. https:\/\/books.google.com.tr\/books?id=A92_zQEACAAJ"},{"key":"e_1_3_2_2_16_1","first-page":"0264","volume-title":"International Journal of Information Security","volume":"14","author":"Halevi Tzipora","year":"2014","unstructured":"Tzipora Halevi and Nitesh Saxena . 2014 . Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios . International Journal of Information Security , Vol. 14 (09 2014), 1--14. https:\/\/doi.org\/10.1007\/s10207-014- 0264 - 0267 10.1007\/s10207-014-0264-7 Tzipora Halevi and Nitesh Saxena. 2014. Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios. International Journal of Information Security, Vol. 14 (09 2014), 1--14. https:\/\/doi.org\/10.1007\/s10207-014-0264-7"},{"key":"e_1_3_2_2_17_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2014","unstructured":"Diederik P. Kingma and Jimmy Ba . 2014 . Adam : A Method for Stochastic Optimization. CoRR , Vol. abs\/ 1412 .6980 (2014). arxiv: 1412.6980 http:\/\/arxiv.org\/abs\/1412.6980 Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. CoRR, Vol. abs\/1412.6980 (2014). arxiv: 1412.6980 http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30115-8_22"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300568"},{"key":"e_1_3_2_2_20_1","first-page":"10","volume-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.","volume":"2","author":"Colman Leung Ho-Man","year":"2018","unstructured":"Ho-Man Colman Leung , Chi-Wing Fu , and Pheng-Ann Heng . 2018 . TwistIn: Tangible Authentication of Smart Devices via Motion Co-Analysis with a Smartwatch . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. , Vol. 2 , 2, Article 72 (July 2018), 24 pages. https:\/\/doi.org\/ 10 .1145\/3214275 10.1145\/3214275 Ho-Man Colman Leung, Chi-Wing Fu, and Pheng-Ann Heng. 2018. TwistIn: Tangible Authentication of Smart Devices via Motion Co-Analysis with a Smartwatch. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., Vol. 2, 2, Article 72 (July 2018), 24 pages. https:\/\/doi.org\/10.1145\/3214275"},{"key":"e_1_3_2_2_21_1","volume-title":"Insertions and Reversals. Soviet Physics Doklady","volume":"10","author":"Levenshtein Vladimir I","year":"1966","unstructured":"Vladimir I Levenshtein . 1966 . Binary Codes Capable of Correcting Deletions , Insertions and Reversals. Soviet Physics Doklady , Vol. 10 (February 1966), 707. Vladimir I Levenshtein. 1966. Binary Codes Capable of Correcting Deletions, Insertions and Reversals. Soviet Physics Doklady, Vol. 10 (February 1966), 707."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2016.7456514"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813668"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267242.3267252"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897905"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_2_2_27_1","volume-title":"Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications. In 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS). 464--473","author":"Meteriz \u00dclk\u00fc","year":"2020","unstructured":"\u00dclk\u00fc Meteriz , Necip Fazil Yldran , Joongheon Kim , and David Mohaisen . 2020 . Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications. In 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS). 464--473 . https:\/\/doi.org\/10.1109\/ICDCS47774.2020.00063 10.1109\/ICDCS47774.2020.00063 \u00dclk\u00fc Meteriz, Necip Fazil Yldran, Joongheon Kim, and David Mohaisen. 2020. Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications. In 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS). 464--473. https:\/\/doi.org\/10.1109\/ICDCS47774.2020.00063"},{"key":"e_1_3_2_2_28_1","volume-title":"SoK: Keylogging Side Channels. In 2018 IEEE Symposium on Security and Privacy (SP). 211--228","author":"Monaco J. V.","year":"2018","unstructured":"J. V. Monaco . 2018 . SoK: Keylogging Side Channels. In 2018 IEEE Symposium on Security and Privacy (SP). 211--228 . J. V. Monaco. 2018. SoK: Keylogging Side Channels. In 2018 IEEE Symposium on Security and Privacy (SP). 211--228."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Peter Norvig. 2007. https:\/\/norvig.com\/spell-correct.html  Peter Norvig. 2007. https:\/\/norvig.com\/spell-correct.html","DOI":"10.1016\/S0262-4079(06)61118-4"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1111\/1556-4029.14109"},{"key":"e_1_3_2_2_31_1","unstructured":"Alec Radford Jeff Wu Rewon Child David Luan Dario Amodei and Ilya Sutskever. 2019. Language Models are Unsupervised Multitask Learners. (2019).  Alec Radford Jeff Wu Rewon Child David Luan Dario Amodei and Ilya Sutskever. 2019. Language Models are Unsupervised Multitask Learners. (2019)."},{"key":"e_1_3_2_2_32_1","volume-title":"Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks. arxiv","author":"Sabra Mohd","year":"2010","unstructured":"Mohd Sabra , Anindya Maiti , and Murtuza Jadliwala . 2020. Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks. arxiv : 2010 .12078 [cs.CR] Mohd Sabra, Anindya Maiti, and Murtuza Jadliwala. 2020. Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks. arxiv: 2010.12078 [cs.CR]"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2670313"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2017.7917864"},{"volume-title":"Quantifying Sources and Types of Smartwatch Usage Sessions","author":"Visuri Aku","key":"e_1_3_2_2_35_1","unstructured":"Aku Visuri , Zhanna Sarsenbayeva , Niels van Berkel , Jorge Goncalves , Reza Rawassizadeh , Vassilis Kostakos , and Denzil Ferreira . 2017. Quantifying Sources and Types of Smartwatch Usage Sessions . Association for Computing Machinery , New York, NY, USA , 3569--3581. https:\/\/doi.org\/10.1145\/3025453.3025817 10.1145\/3025453.3025817 Aku Visuri, Zhanna Sarsenbayeva, Niels van Berkel, Jorge Goncalves, Reza Rawassizadeh, Vassilis Kostakos, and Denzil Ferreira. 2017. Quantifying Sources and Types of Smartwatch Usage Sessions. Association for Computing Machinery, New York, NY, USA, 3569--3581. https:\/\/doi.org\/10.1145\/3025453.3025817"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191771"},{"key":"e_1_3_2_2_37_1","volume-title":"Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. USENIX Security Symposium (01","author":"Vuagnoux Martin","year":"2009","unstructured":"Martin Vuagnoux and Sylvain Pasini . 2009 . Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. USENIX Security Symposium (01 2009). Martin Vuagnoux and Sylvain Pasini. 2009. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. USENIX Security Symposium (01 2009)."},{"key":"#cr-split#-e_1_3_2_2_38_1.1","doi-asserted-by":"crossref","unstructured":"Chen Wang Xiaonan Guo Yan Wang Yingying Chen and Bo Liu. 2016. Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN. 189--200. https:\/\/doi.org\/10.1145\/2897845.2897847 10.1145\/2897845.2897847","DOI":"10.1145\/2897845.2897847"},{"key":"#cr-split#-e_1_3_2_2_38_1.2","doi-asserted-by":"crossref","unstructured":"Chen Wang Xiaonan Guo Yan Wang Yingying Chen and Bo Liu. 2016. Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN. 189--200. https:\/\/doi.org\/10.1145\/2897845.2897847","DOI":"10.1145\/2897845.2897847"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom45495.2020.9127367"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463676.3485607","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3463676.3485607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:08Z","timestamp":1750195508000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463676.3485607"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":42,"alternative-id":["10.1145\/3463676.3485607","10.1145\/3463676"],"URL":"https:\/\/doi.org\/10.1145\/3463676.3485607","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}