{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:52:19Z","timestamp":1753275139344,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["236615297,440059533"],"award-info":[{"award-number":["236615297,440059533"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,24]]},"DOI":"10.1145\/3577923.3583652","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T10:57:59Z","timestamp":1681988279000},"page":"225-236","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8399-3567","authenticated-orcid":false,"given":"Sebastian","family":"Surminski","sequence":"first","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8589-5231","authenticated-orcid":false,"given":"Christian","family":"Niesler","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5211-6166","authenticated-orcid":false,"given":"Sebastian","family":"Linsner","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7322-2777","authenticated-orcid":false,"given":"Lucas","family":"Davi","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-038X","authenticated-orcid":false,"given":"Christian","family":"Reuter","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,4,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_1_2_1","volume-title":"DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. In 26th Annual Network and Distributed System Security Symposium (NDSS).","author":"Abera Tigist","year":"2019","unstructured":"Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, and Matthias Schunter. 2019. DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. In 26th Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399421"},{"key":"e_1_3_2_1_4_1","volume-title":"SoK: Security Evaluation of Home-Based IoT Deployments. In IEEE Symposium on Security and Privacy (SP).","author":"Alrawi Omar","year":"2019","unstructured":"Omar Alrawi, Chaz Lever, Manos Antonakakis, and Fabian Monrose. 2019. SoK: Security Evaluation of Home-Based IoT Deployments. In IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_5_1","volume-title":"The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle. In 30th USENIX Security Symposium.","author":"Alrawi Omar","year":"2021","unstructured":"Omar Alrawi, Charles Lever, Kevin Valakuzhy, Ryan Court, Kevin Z. Snow, Fabian Monrose, and Manos Antonakakis. 2021. The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle. In 30th USENIX Security Symposium."},{"key":"e_1_3_2_1_6_1","unstructured":"ARM Limited. 2009. Security Technology Building a Secure System Using Trustzone Technology (White Paper)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516650"},{"key":"e_1_3_2_1_8_1","volume-title":"User interface design patterns and ontology models for adaptive mobile applications. Personal and Ubiquitous Computing","author":"Braham Amani","year":"2021","unstructured":"Amani Braham, F\u00e9lix Buend'ia, Maha Khemaja, and Faiez Gargouri. 2021. User interface design patterns and ontology models for adaptive mobile applications. Personal and Ubiquitous Computing (2021)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_2_1_10_1","unstructured":"Business Wire. 2021. Strategy Analytics: Global Smart Speaker Sales Cross 150 Million Units for 2020 Following Robust Q4 Demand. https:\/\/www.businesswire.com\/news\/home\/20210303005852\/en\/Strategy-Analytics-Global-Smart-Speaker-Sales-Cross-150-Million-Units-for-2020-Following-Robust-Q4-Demand"},{"key":"e_1_3_2_1_11_1","volume-title":"CHI Conference on Human Factors in Computing Systems.","author":"Caine Kelly","year":"2016","unstructured":"Kelly Caine. 2016. Local Standards for Sample Size at CHI. In CHI Conference on Human Factors in Computing Systems."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653711"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423339"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0124-7"},{"key":"e_1_3_2_1_15_1","volume-title":"IACR Cryptology ePrint archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint archive (2016). http:\/\/eprint.iacr.org\/2016\/086"},{"key":"e_1_3_2_1_16_1","unstructured":"Corbin Davenport. 2020. This smartphone has physical kill switches for its cameras microphone data Bluetooth and Wi-Fi. https:\/\/www.androidpolice.com\/2020\/08\/22\/this-smartphone-has-physical-kill-switches-for-its-cameras-microphone-data-bluetooth-and-wi-fi\/ Retrieved 2022-03-07 from"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240821"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062276"},{"key":"e_1_3_2_1_19_1","volume-title":"ACM Computing Surveys (CSUR)","volume":"53","author":"Edu Jide S","year":"2020","unstructured":"Jide S Edu, Jose M Such, and Guillermo Suarez-Tangil. 2020. Smart Home Personal Assistants: A Security and Privacy Review. ACM Computing Surveys (CSUR) , Vol. 53, 6 (2020)."},{"key":"e_1_3_2_1_20_1","volume-title":"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In 19th Annual Network and Distributed System Security Symposium (NDSS).","author":"Eldefrawy Karim","year":"2012","unstructured":"Karim Eldefrawy, Gene Tsudik, Aur\u00e9 lien Francillon, and Daniele Perito. 2012. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In 19th Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_21_1","unstructured":"Espressif Systems. 2018. Espressif Achieves the 100-Million Target for IoT Chip Shipments. https:\/\/www.espressif.com\/en\/news\/Espressif_Achieves_the_Hundredmillion_Target_for_IoT_Chip_Shipments Retrieved 2022-03-07 from"},{"key":"e_1_3_2_1_22_1","unstructured":"Espressif Systems. 2021a. ESP32 Series Datasheet. https:\/\/www.espressif.com\/sites\/default\/files\/documentation\/esp32_datasheet_en.pdf Retrieved 2022-03-07 from"},{"key":"e_1_3_2_1_23_1","unstructured":"Espressif Systems. 2021b. Memory Capabilities. https:\/\/docs.espressif.com\/projects\/esp-idf\/en\/latest\/esp32\/api-reference\/system\/mem_alloc.html Retrieved 2022-03--30 from"},{"key":"e_1_3_2_1_24_1","unstructured":"Espressif Systems. 2021c. Over The Air Updates (OTA). https:\/\/docs.espressif.com\/projects\/esp-idf\/en\/latest\/esp32\/api-reference\/system\/ota.html Retrieved 2022-03--30 from"},{"key":"e_1_3_2_1_25_1","unstructured":"Espressif Systems. 2022a. Partition Tables. https:\/\/docs.espressif.com\/projects\/esp-idf\/en\/latest\/esp32\/api-guides\/partition-tables.html Retrieved 2022-03--17 from"},{"key":"e_1_3_2_1_26_1","unstructured":"Espressif Systems. 2022b. Wi-Fi Driver - ESP32 - ESP-IDF Programming Guide latest documentation. https:\/\/docs.espressif.com\/projects\/esp-idf\/en\/latest\/esp32\/api-guides\/wifi.html Retrieved 2022-03--16 from"},{"key":"e_1_3_2_1_27_1","volume-title":"Instruments, & Computers","author":"Faulkner Laura","year":"2003","unstructured":"Laura Faulkner. 2003. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing. Behavior Research Methods, Instruments, & Computers, Vol. 35, 3 (2003)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_3_2_1_29_1","unstructured":"FreeRTOS. 2022. GitHub - FreeRTOS. https:\/\/github.com\/FreeRTOS\/FreeRTOS\/tree\/master Retrieved 2022-03--22 from"},{"key":"e_1_3_2_1_30_1","unstructured":"Gemalto. 2018. The State of IoT Security. https:\/\/www.infopoint-security.de\/media\/gemalto-state-of-iot-security-report.pdf Retrieved 2022-03-07 from"},{"key":"e_1_3_2_1_31_1","volume-title":"Scalable Group Audio-Based Authentication Scheme for IoT Devices. In 12th International Conference on Computational Intelligence and Security (CIS).","author":"Gu Zhonglei","year":"2016","unstructured":"Zhonglei Gu and Yang Liu. 2016. Scalable Group Audio-Based Authentication Scheme for IoT Devices. In 12th International Conference on Computational Intelligence and Security (CIS)."},{"key":"e_1_3_2_1_32_1","volume-title":"SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium.","author":"Guo Zhixiu","year":"2020","unstructured":"Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. 2020. SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium."},{"key":"e_1_3_2_1_33_1","volume-title":"Enabling Autonomous IoT Device Pairing Using Different Sensor Types. In IEEE Symposium on Security and Privacy (SP).","author":"Han Jun","year":"2018","unstructured":"Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, and Patrick Tague. 2018. Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types. In IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_34_1","volume-title":"an introduction to voice assistants. Medical reference services quarterly","author":"Hoy Matthew B","year":"2018","unstructured":"Matthew B Hoy. 2018. Alexa, Siri, Cortana, and more: an introduction to voice assistants. Medical reference services quarterly , Vol. 37, 1 (2018)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270348"},{"key":"e_1_3_2_1_36_1","unstructured":"Bret Kinsella. 2021. Alexa Skill Counts Surpass 80K in US Spain Adds the Most Skills New Skill Rate Falls Globally. https:\/\/voicebot.ai\/2021\/01\/14\/alexa-skill-counts-surpass-80k-in-us-spain-adds-the-most-skills-new-skill-introduction-rate-continues-to-fall-across-countries\/ Retrieved 2022-03--16 from"},{"key":"e_1_3_2_1_37_1","volume-title":"Google Assistant Actions Grew Quickly in Several Languages","author":"Kinsella Bret","year":"2019","unstructured":"Bret Kinsella. 2022. Google Assistant Actions Grew Quickly in Several Languages in 2019, Matched Alexa Growth in English. https:\/\/voicebot.ai\/2020\/01\/19\/google-assistant-actions-grew-quickly-in-several-languages-in-2019-match-alexa-growth-in-english\/ Retrieved 2022-03--16 from"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_2_1_39_1","volume-title":"Computer","volume":"50","author":"Kolias Constantinos","year":"2017","unstructured":"Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and Other Botnets. Computer, Vol. 50, 7 (2017)."},{"key":"e_1_3_2_1_40_1","volume-title":"Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. ACM on Human-Computer Interaction","author":"Lau Josephine","year":"2018","unstructured":"Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. ACM on Human-Computer Interaction , Vol. 2, CSCW (2018)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT46805.2019.8947178"},{"volume-title":"authentication, and public key systems","author":"Merkle Ralph Charles","key":"e_1_3_2_1_42_1","unstructured":"Ralph Charles Merkle. 1979. Secrecy, authentication, and public key systems. Stanford University."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329842"},{"key":"e_1_3_2_1_44_1","volume-title":"Design patterns for user interface for mobile applications. Advances in engineering software","author":"Nilsson Erik G","year":"2009","unstructured":"Erik G Nilsson. 2009. Design patterns for user interface for mobile applications. Advances in engineering software , Vol. 40, 12 (2009)."},{"key":"e_1_3_2_1_45_1","unstructured":"NodeMCU Documentation. 2022. WiFi Module. https:\/\/nodemcu.readthedocs.io\/en\/release\/modules\/wifi\/ Retrieved 2022-03--16 from"},{"key":"e_1_3_2_1_46_1","volume-title":"22nd USENIX Security Symposium.","author":"Noorman Job","year":"2013","unstructured":"Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base. In 22nd USENIX Security Symposium."},{"key":"e_1_3_2_1_47_1","volume-title":"VRASED: A Verified Hardware\/Software Co-Design for Remote Attestation. In 28th USENIX Security Symposium.","author":"Oliveira Nunes Ivan De","year":"2019","unstructured":"Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, and Gene Tsudik. 2019. VRASED: A Verified Hardware\/Software Co-Design for Remote Attestation. In 28th USENIX Security Symposium."},{"key":"e_1_3_2_1_48_1","volume-title":"29th USENIX Security Symposium.","author":"Oliveira Nunes Ivan De","year":"2020","unstructured":"Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, and Gene Tsudik. 2020. APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise. In 29th USENIX Security Symposium."},{"key":"e_1_3_2_1_49_1","volume-title":"DIALED: Data Integrity Attestation for Low-end Embedded Devices. In 58th ACM\/IEEE Design Automation Conference (DAC).","author":"Oliveira Nunes Ivan De","year":"2021","unstructured":"Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, and Gene Tsudik. 2021a. DIALED: Data Integrity Attestation for Low-end Embedded Devices. In 58th ACM\/IEEE Design Automation Conference (DAC)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474029"},{"key":"e_1_3_2_1_51_1","volume-title":"Internet of Things (IoT) Top 10","author":"OWASP.","year":"2018","unstructured":"OWASP. 2018. Internet of Things (IoT) Top 10 2018. https:\/\/owasp.org\/www-pdf-archive\/OWASP-IoT-Top-10--2018-final.pdf Retrieved 2022-03-07 from"},{"key":"e_1_3_2_1_52_1","volume-title":"Bootstrapping Trust in Commodity Computers. In IEEE Symposium on Security and Privacy (SP).","author":"Parno Bryan","year":"2010","unstructured":"Bryan Parno, Jonathan M McCune, and Adrian Perrig. 2010. Bootstrapping Trust in Commodity Computers. In IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_53_1","volume-title":"On the secure hash algorithm family. Cryptography in context","author":"Penard Wouter","year":"2008","unstructured":"Wouter Penard and Tim van Werkhoven. 2008. On the secure hash algorithm family. Cryptography in context (2008)."},{"key":"e_1_3_2_1_54_1","unstructured":"Pine Store ltd. 2022. PinePhone. https:\/\/pine64.com\/product-category\/pinephone\/ Retrieved 2022-03-07 from"},{"key":"e_1_3_2_1_55_1","volume-title":"Usability studies on mobile user interface design patterns: a systematic literature review. Advances in Human-Computer Interaction","author":"Punchoojit Lumpapun","year":"2017","unstructured":"Lumpapun Punchoojit and Nuttanont Hongwarittorrn. 2017. Usability studies on mobile user interface design patterns: a systematic literature review. Advances in Human-Computer Interaction (2017)."},{"key":"e_1_3_2_1_56_1","unstructured":"Kyle Rankin. 2019. Lockdown Mode on the Librem 5: Beyond Hardware Kill Switches. https:\/\/puri.sm\/posts\/lockdown-mode-on-the-librem-5-beyond-hardware-kill-switches\/ Retrieved 2022-03-07 from"},{"key":"e_1_3_2_1_57_1","volume-title":"IoT the Internet of Transformation","author":"Rothmuller Markus","year":"2020","unstructured":"Markus Rothmuller and Sam Barker. 2020. IoT the Internet of Transformation 2020. https:\/\/www.juniperresearch.com\/whitepapers\/iot-the-internet-of-transformation-2020 Retrieved 2022-02--23 from"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.35"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2017.09.001"},{"key":"e_1_3_2_1_60_1","article-title":"Secure Communication Based on Ambient Audio","volume":"12","author":"Sch\u00fcrmann Dominik","year":"2011","unstructured":"Dominik Sch\u00fcrmann and Stephan Sigg. 2011. Secure Communication Based on Ambient Audio. IEEE Transactions on Mobile Computing , Vol. 12, 2 (2011).","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_1_62_1","unstructured":"Smiljanic Stasha. 2021. An In-Depth View into Smart Home Statistics. https:\/\/policyadvice.net\/insurance\/insights\/smart-home-statistics\/ Retrieved 2022-02--25 from"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988546"},{"key":"e_1_3_2_1_64_1","volume-title":"Computer Networks","volume":"149","author":"Steiner Rodrigo Vieira","year":"2019","unstructured":"Rodrigo Vieira Steiner and Emil Lupu. 2019. Towards more practical software-based attestation. Computer Networks , Vol. 149 (2019)."},{"key":"e_1_3_2_1_65_1","volume-title":"arXiv preprint arXiv:2010.10788","author":"Su Dan","year":"2020","unstructured":"Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, and Wei Wang. 2020. \"Are you home alone?\" \"Yes\" Disclosing Security and Privacy Vulnerabilities in Alexa Skills. arXiv preprint arXiv:2010.10788 (2020)."},{"key":"e_1_3_2_1_66_1","volume-title":"OAT: Attesting Operation Integrity of Embedded Devices. In IEEE Symposium on Security and Privacy (SP).","author":"Sun Zhichuang","year":"2020","unstructured":"Zhichuang Sun, Bo Feng, Long Lu, and Somesh Jha. 2020. OAT: Attesting Operation Integrity of Embedded Devices. In IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484788"},{"key":"e_1_3_2_1_68_1","first-page":"59","article-title":"Trusted Platform Module Library Specification, Family ?2.0","volume":"01","author":"Trusted Computing Group","year":"2019","unstructured":"Trusted Computing Group. 2019. Trusted Platform Module Library Specification, Family ?2.0\", Level 00, Revision 01.59 -- November 2019. https:\/\/trustedcomputinggroup.org\/work-groups\/trusted-platform-module\/ Retrieved 2022-03--26 from","journal-title":"Level 00, Revision"},{"key":"e_1_3_2_1_69_1","volume-title":"Internet of Things (IoT) total annual revenue worldwide from 2020 to","author":"Vailshery Lionel Sujay","year":"2030","unstructured":"Lionel Sujay Vailshery. 2022. Internet of Things (IoT) total annual revenue worldwide from 2020 to 2030. https:\/\/www.statista.com\/statistics\/1194709\/iot-revenue-worldwide\/ Retrieved 2023-02-06 from"},{"key":"e_1_3_2_1_70_1","volume-title":"Monophone-Based Background Modeling for Two-Stage On-Device Wake Word Detection. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).","author":"Wu Minhua","year":"2018","unstructured":"Minhua Wu, Sankaran Panchapagesan, Ming Sun, Jiacheng Gu, Ryan Thomas, Shiv Naga Prasad Vitaladevuni, Bjorn Hoffmeister, and Arindam Mandal. 2018. Monophone-Based Background Modeling for Two-Stage On-Device Wake Word Detection. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3023954"},{"key":"e_1_3_2_1_72_1","volume-title":"End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)."},{"key":"e_1_3_2_1_73_1","unstructured":"Matthias Zeppelzauer Alexis Ringot and Florian Taurer. 2019. SoniTalk -- an open ultrasonic communication protocol. https:\/\/sonitalk.fhstp.ac.at\/ Retrieved 2022-03-07 from"},{"key":"e_1_3_2_1_74_1","unstructured":"Matthias Zeppelzauer Alexis Ringot and Florian Taurer. 2022. SoniTalk. https:\/\/github.com\/fhstp\/SoniTalk Retrieved 2022-03-07 from"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00016"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471866"},{"key":"e_1_3_2_1_77_1","volume-title":"User Perceptions of Smart Home IoT Privacy. ACM on human-computer interaction","author":"Zheng Serena","year":"2018","unstructured":"Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. ACM on human-computer interaction , Vol. 2, CSCW (2018). io"}],"event":{"name":"CODASPY '23: Thirteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Charlotte NC USA","acronym":"CODASPY '23"},"container-title":["Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583652","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3577923.3583652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:41Z","timestamp":1750183721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583652"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,24]]},"references-count":77,"alternative-id":["10.1145\/3577923.3583652","10.1145\/3577923"],"URL":"https:\/\/doi.org\/10.1145\/3577923.3583652","relation":{},"subject":[],"published":{"date-parts":[[2023,4,24]]},"assertion":[{"value":"2023-04-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}