{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:41:03Z","timestamp":1765438863859,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Institute of Information & Communications Technology Planning & Evaluation (IITP)","award":["2020-0-00913"],"award-info":[{"award-number":["2020-0-00913"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3582828","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"41-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Invasion of location privacy using online map services and smartphone sensors"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2514-054X","authenticated-orcid":false,"given":"Hyunsoo","family":"Kim","sequence":"first","affiliation":[{"name":"NCSOFT, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4628-6345","authenticated-orcid":false,"given":"Youngbae","family":"Jeon","sequence":"additional","affiliation":[{"name":"Samsung Research, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2123-9849","authenticated-orcid":false,"given":"Ji Won","family":"Yoon","sequence":"additional","affiliation":[{"name":"Korea University, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of SDAIR-94","author":"Cavnar B","year":"1994","unstructured":"William\u00a0 B Cavnar , John\u00a0 M Trenkle , 1994 . N-gram-based text categorization . In Proceedings of SDAIR-94 , 3rd annual symposium on document analysis and information retrieval, Vol.\u00a0161175. Citeseer. William\u00a0B Cavnar, John\u00a0M Trenkle, 1994. N-gram-based text categorization. In Proceedings of SDAIR-94, 3rd annual symposium on document analysis and information retrieval, Vol.\u00a0161175. Citeseer."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871535"},{"key":"e_1_3_2_1_3_1","volume-title":"List of metro systems. https:\/\/en.wikipedia.org\/wiki\/List_of_metro_systems [Online","author":"Wikipedia","year":"2022","unstructured":"Wikipedia contributors. 2022. List of metro systems. https:\/\/en.wikipedia.org\/wiki\/List_of_metro_systems [Online ; accessed 01- Sep- 2022 ]. Wikipedia contributors. 2022. List of metro systems. https:\/\/en.wikipedia.org\/wiki\/List_of_metro_systems [Online; accessed 01-Sep-2022]."},{"key":"e_1_3_2_1_4_1","volume-title":"Core Motion. https:\/\/developer.apple.com\/document-ation\/coremotion. [Online","author":"Developer Apple","year":"2022","unstructured":"Apple Developer . 2022. Core Motion. https:\/\/developer.apple.com\/document-ation\/coremotion. [Online ; accessed 15- May - 2022 ]. Apple Developer. 2022. Core Motion. https:\/\/developer.apple.com\/document-ation\/coremotion. [Online; accessed 15-May-2022]."},{"key":"e_1_3_2_1_5_1","volume-title":"Motion Sensors. https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_motion. [Online","author":"Developer Android","year":"2022","unstructured":"Android Developer . 2022. Motion Sensors. https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_motion. [Online ; accessed 26- April - 2022 ]. Android Developer. 2022. Motion Sensors. https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_motion. [Online; accessed 26-April-2022]."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview#sensors-rate-limiting. [Online","author":"Developer Android","year":"2022","unstructured":"Android Developer . 2022. Sensor Rate-Limiting . https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview#sensors-rate-limiting. [Online ; accessed 26- April - 2022 ]. Android Developer. 2022. Sensor Rate-Limiting. https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview#sensors-rate-limiting. [Online; accessed 26-April-2022]."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v031.i07"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.80"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2012.6151305"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840660"},{"key":"e_1_3_2_1_11_1","volume-title":"Unauthorized Location Inference Using Smart Device Pressure Sensor. In 2020 9th Mediterranean Conference on Embedded Computing (MECO). IEEE, 1\u20136.","author":"Ibrahim Ahmed","year":"2020","unstructured":"Ahmed Ibrahim and Ahmed Eltawil . 2020 . Unauthorized Location Inference Using Smart Device Pressure Sensor. In 2020 9th Mediterranean Conference on Embedded Computing (MECO). IEEE, 1\u20136. Ahmed Ibrahim and Ahmed Eltawil. 2020. Unauthorized Location Inference Using Smart Device Pressure Sensor. In 2020 9th Mediterranean Conference on Embedded Computing (MECO). IEEE, 1\u20136."},{"key":"e_1_3_2_1_12_1","volume-title":"The distribution of the flora in the alpine zone. 1. New phytologist 11, 2","author":"Jaccard Paul","year":"1912","unstructured":"Paul Jaccard . 1912. The distribution of the flora in the alpine zone. 1. New phytologist 11, 2 ( 1912 ), 37\u201350. Paul Jaccard. 1912. The distribution of the flora in the alpine zone. 1. New phytologist 11, 2 (1912), 37\u201350."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2382568"},{"key":"e_1_3_2_1_14_1","unstructured":"David LeBlanc and Michael Howard. 2002. Writing secure code. Pearson Education.  David LeBlanc and Michael Howard. 2002. Writing secure code. Pearson Education."},{"key":"e_1_3_2_1_15_1","volume-title":"http:\/\/www.seoulmetro.co.kr\/en\/cyberStation.do?action=time. [Online","author":"Metro Seoul","year":"2022","unstructured":"Seoul Metro . 2022. Seoul Metro . http:\/\/www.seoulmetro.co.kr\/en\/cyberStation.do?action=time. [Online ; accessed 01- Sep- 2022 ]. Seoul Metro. 2022. Seoul Metro. http:\/\/www.seoulmetro.co.kr\/en\/cyberStation.do?action=time. [Online; accessed 01-Sep-2022]."},{"key":"e_1_3_2_1_16_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Michalevsky Yan","year":"2015","unstructured":"Yan Michalevsky , Aaron Schulman , Gunaa\u00a0Arumugam Veerapandian , Dan Boneh , and Gabi Nakibly . 2015 . { PowerSpy} : Location Tracking Using Mobile Device Power Analysis . In 24th USENIX Security Symposium (USENIX Security 15) . 785\u2013800. Yan Michalevsky, Aaron Schulman, Gunaa\u00a0Arumugam Veerapandian, Dan Boneh, and Gabi Nakibly. 2015. { PowerSpy} : Location Tracking Using Mobile Device Power Analysis. In 24th USENIX Security Symposium (USENIX Security 15). 785\u2013800."},{"key":"e_1_3_2_1_17_1","volume-title":"2016 IEEE Symposium on Security and Privacy (SP). IEEE, 397\u2013413","author":"Narain Sashank","year":"2016","unstructured":"Sashank Narain , Triet\u00a0 D Vo-Huu , Kenneth Block , and Guevara Noubir . 2016 . Inferring user routes and locations using zero-permission mobile sensors . In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 397\u2013413 . Sashank Narain, Triet\u00a0D Vo-Huu, Kenneth Block, and Guevara Noubir. 2016. Inferring user routes and locations using zero-permission mobile sensors. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 397\u2013413."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340518"},{"key":"e_1_3_2_1_19_1","volume-title":"2021 18th International Conference on Privacy, Security and Trust (PST). IEEE, 1\u201310","author":"Roth Christian","year":"2021","unstructured":"Christian Roth , Ngoc\u00a0Thanh Dinh , Marc Ro\u00dfberger , and Do\u011fan Kesdo\u011fan . 2021 . DaRoute: Inferring trajectories from zero-permission smartphone sensors . In 2021 18th International Conference on Privacy, Security and Trust (PST). IEEE, 1\u201310 . Christian Roth, Ngoc\u00a0Thanh Dinh, Marc Ro\u00dfberger, and Do\u011fan Kesdo\u011fan. 2021. DaRoute: Inferring trajectories from zero-permission smartphone sensors. In 2021 18th International Conference on Privacy, Security and Trust (PST). IEEE, 1\u201310."},{"key":"e_1_3_2_1_20_1","first-page":"1","article-title":"Dynamic time warping algorithm review. Information and Computer Science Department University of Hawaii at Manoa Honolulu","volume":"855","author":"Senin Pavel","year":"2008","unstructured":"Pavel Senin . 2008 . Dynamic time warping algorithm review. Information and Computer Science Department University of Hawaii at Manoa Honolulu , USA 855 , 1 - 23 (2008), 40. Pavel Senin. 2008. Dynamic time warping algorithm review. Information and Computer Science Department University of Hawaii at Manoa Honolulu, USA 855, 1-23 (2008), 40.","journal-title":"USA"},{"key":"e_1_3_2_1_21_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Sikder Amit\u00a0Kumar","year":"2017","unstructured":"Amit\u00a0Kumar Sikder , Hidayet Aksu , and A\u00a0Selcuk Uluagac . 2017 . { 6thSense} : A Context-aware Sensor-based Attack Detector for Smart Devices . In 26th USENIX Security Symposium (USENIX Security 17) . 397\u2013414. Amit\u00a0Kumar Sikder, Hidayet Aksu, and A\u00a0Selcuk Uluagac. 2017. { 6thSense} : A Context-aware Sensor-based Attack Detector for Smart Devices. In 26th USENIX Security Symposium (USENIX Security 17). 397\u2013414."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2893253"},{"key":"e_1_3_2_1_23_1","volume-title":"Progress in Location-Based Services","author":"Van\u00a0Erum Kris","year":"2016","unstructured":"Kris Van\u00a0Erum and Johannes Sch\u00f6ning . 2017. SubwayAPPS: Using smartphone barometers for positioning in underground transportation environments . In Progress in Location-Based Services 2016 . Springer , 69\u201385. Kris Van\u00a0Erum and Johannes Sch\u00f6ning. 2017. SubwayAPPS: Using smartphone barometers for positioning in underground transportation environments. In Progress in Location-Based Services 2016. Springer, 69\u201385."},{"key":"e_1_3_2_1_24_1","volume-title":"9th USENIX Workshop on Offensive Technologies (WOOT 15)","author":"Watanabe Takuya","year":"2015","unstructured":"Takuya Watanabe , Mitsuaki Akiyama , and Tatsuya Mori . 2015 . { RouteDetector} : Sensor-based Positioning System That Exploits { Spatio-Temporal} Regularity of Human Mobility . In 9th USENIX Workshop on Offensive Technologies (WOOT 15) . Takuya Watanabe, Mitsuaki Akiyama, and Tatsuya Mori. 2015. { RouteDetector} : Sensor-based Positioning System That Exploits { Spatio-Temporal} Regularity of Human Mobility. In 9th USENIX Workshop on Offensive Technologies (WOOT 15)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"1680","DOI":"10.1587\/transinf.2016ICP0022","article-title":"Tracking the Human Mobility Using Mobile Device Sensors","volume":"100","author":"Watanabe Takuya","year":"2017","unstructured":"Takuya Watanabe , Mitsuaki Akiyama , and Tatsuya Mori . 2017 . Tracking the Human Mobility Using Mobile Device Sensors . IEICE TRANSACTIONS on Information and Systems 100 , 8 (2017), 1680 \u2013 1690 . Takuya Watanabe, Mitsuaki Akiyama, and Tatsuya Mori. 2017. Tracking the Human Mobility Using Mobile Device Sensors. IEICE TRANSACTIONS on Information and Systems 100, 8 (2017), 1680\u20131690.","journal-title":"IEICE TRANSACTIONS on Information and Systems"},{"volume-title":"The Free Encyclopedia. https:\/\/en.wikipedia.org\/wiki\/List_of_metro_systems. [Online","year":"2022","key":"e_1_3_2_1_26_1","unstructured":"Wikipedia. 2022. List of metro systems \u2014 Wikipedia , The Free Encyclopedia. https:\/\/en.wikipedia.org\/wiki\/List_of_metro_systems. [Online ; accessed 15- April - 2022 ]. Wikipedia. 2022. List of metro systems \u2014 Wikipedia, The Free Encyclopedia. https:\/\/en.wikipedia.org\/wiki\/List_of_metro_systems. [Online; accessed 15-April-2022]."},{"volume-title":"Seoul Metropolitan Subway. https:\/\/en.wikipedia.org\/wiki\/Seoul_Metropolitan_Subway. [Online","year":"2022","key":"e_1_3_2_1_27_1","unstructured":"Wikipedia. 2022. Seoul Metropolitan Subway. https:\/\/en.wikipedia.org\/wiki\/Seoul_Metropolitan_Subway. [Online ; accessed 01- Sep- 2022 ]. Wikipedia. 2022. Seoul Metropolitan Subway. https:\/\/en.wikipedia.org\/wiki\/Seoul_Metropolitan_Subway. [Online; accessed 01-Sep-2022]."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks","author":"Ye Haibo","year":"2014","unstructured":"Haibo Ye , Tao Gu , Xianping Tao , and Jian Lu . 2014 . Crowdsourced smartphone sensing for localization in metro trains . In Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014. IEEE, 1\u20139. Haibo Ye, Tao Gu, Xianping Tao, and Jian Lu. 2014. Crowdsourced smartphone sensing for localization in metro trains. In Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014. IEEE, 1\u20139."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2791579"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","first-page":"91063","DOI":"10.1109\/ACCESS.2019.2927053","article-title":"Pedestrian dead reckoning using pocket-worn smartphone","volume":"7","author":"Zhao Hongyu","year":"2019","unstructured":"Hongyu Zhao , Luyao Zhang , Sen Qiu , Zhelong Wang , Ning Yang , and Jian Xu . 2019 . Pedestrian dead reckoning using pocket-worn smartphone . IEEE Access 7 (2019), 91063 \u2013 91073 . Hongyu Zhao, Luyao Zhang, Sen Qiu, Zhelong Wang, Ning Yang, and Jian Xu. 2019. Pedestrian dead reckoning using pocket-worn smartphone. IEEE Access 7 (2019), 91063\u201391073.","journal-title":"IEEE Access"}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582828","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:28Z","timestamp":1750182688000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582828"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":30,"alternative-id":["10.1145\/3579856.3582828","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3582828","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}