{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:26:00Z","timestamp":1755033960370,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T00:00:00Z","timestamp":1666569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,24]]},"DOI":"10.1145\/3584318.3584321","type":"proceedings-article","created":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T22:06:15Z","timestamp":1687817175000},"page":"35-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Side Auth: Synthesizing Virtual Sensors for Authentication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3429-7127","authenticated-orcid":false,"given":"Yan","family":"Long","sequence":"first","affiliation":[{"name":"University of Michigan, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5770-6421","authenticated-orcid":false,"given":"Kevin","family":"Fu","sequence":"additional","affiliation":[{"name":"Northeastern University, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Trick: Switching off the optical image stabilization of iPhone X XS XS Max XR. https:\/\/www.sir-apfelot.de\/en\/switch-off-optical-image-stabilization-iphone-x-xs-xs-max-xr-23970\/.  2019. Trick: Switching off the optical image stabilization of iPhone X XS XS Max XR. https:\/\/www.sir-apfelot.de\/en\/switch-off-optical-image-stabilization-iphone-x-xs-xs-max-xr-23970\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2022. Matlab templateSVM. https:\/\/www.mathworks.com\/help\/stats\/templatesvm.html.  2022. Matlab templateSVM. https:\/\/www.mathworks.com\/help\/stats\/templatesvm.html."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468499"},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Critical Information Infrastructures Security. Springer, 207\u2013224","author":"Aubel Pol\u00a0Van","year":"2017","unstructured":"Pol\u00a0Van Aubel , Kostas Papagiannopoulos , \u0141ukasz Chmielewski , and Christian Doerr . 2017 . Side-channel based intrusion detection for industrial control systems . In International Conference on Critical Information Infrastructures Security. Springer, 207\u2013224 . Pol\u00a0Van Aubel, Kostas Papagiannopoulos, \u0141ukasz Chmielewski, and Christian Doerr. 2017. Side-channel based intrusion detection for industrial control systems. In International Conference on Critical Information Infrastructures Security. Springer, 207\u2013224."},{"key":"e_1_3_2_1_5_1","unstructured":"Connor Bolton Yan Long Jun Han Josiah Hester and Kevin Fu. 2021. Touchtone leakage attacks via smartphone sensors: mitigation without hardware modification. arXiv preprint arXiv:2109.13834(2021).  Connor Bolton Yan Long Jun Han Josiah Hester and Kevin Fu. 2021. Touchtone leakage attacks via smartphone sensors: mitigation without hardware modification. arXiv preprint arXiv:2109.13834(2021)."},{"key":"e_1_3_2_1_6_1","unstructured":"Danny Bradbury. 2019. Microsoft font gives away forgery in bankruptcy case. https:\/\/nakedsecurity.sophos.com\/2019\/01\/17\/telltale-font-scuppers-bankruptcy-trust-claim\/.  Danny Bradbury. 2019. Microsoft font gives away forgery in bankruptcy case. https:\/\/nakedsecurity.sophos.com\/2019\/01\/17\/telltale-font-scuppers-bankruptcy-trust-claim\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sna.2008.06.033"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97909-0_46"},{"key":"e_1_3_2_1_9_1","volume-title":"2013 USENIX Workshop on Health Information Technologies (HealthTech 13)","author":"Clark S","year":"2013","unstructured":"Shane\u00a0 S Clark , Benjamin Ransford , Amir Rahmati , Shane Guineau , Jacob Sorber , Wenyuan Xu , and Kevin Fu . 2013 . {WattsUpDoc}: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices . In 2013 USENIX Workshop on Health Information Technologies (HealthTech 13) . Shane\u00a0S Clark, Benjamin Ransford, Amir Rahmati, Shane Guineau, Jacob Sorber, Wenyuan Xu, and Kevin Fu. 2013. {WattsUpDoc}: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices. In 2013 USENIX Workshop on Health Information Technologies (HealthTech 13)."},{"key":"e_1_3_2_1_10_1","volume-title":"On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks. In 2019 22nd Euromicro Conference on Digital System Design (DSD). IEEE, 214\u2013221","author":"Dabosville Guillaume","year":"2019","unstructured":"Guillaume Dabosville , Houssem Maghrebi , Alexis Lhuillery , Thanh-Ha Le , and Julien Bringer . 2019 . On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks. In 2019 22nd Euromicro Conference on Digital System Design (DSD). IEEE, 214\u2013221 . Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Thanh-Ha Le, and Julien Bringer. 2019. On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks. In 2019 22nd Euromicro Conference on Digital System Design (DSD). IEEE, 214\u2013221."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Abe Davis Michael Rubinstein Neal Wadhwa Gautham\u00a0J Mysore Fredo Durand and William\u00a0T Freeman. 2014. The visual microphone: Passive recovery of sound from video. (2014).  Abe Davis Michael Rubinstein Neal Wadhwa Gautham\u00a0J Mysore Fredo Durand and William\u00a0T Freeman. 2014. The visual microphone: Passive recovery of sound from video. (2014).","DOI":"10.1145\/2601097.2601119"},{"key":"e_1_3_2_1_12_1","volume-title":"Master\u2019s Thesis: Replicability and Uniqueness of Tremor Characteristics in Parkinson\u2019s Disease.","author":"Dun Kelsey","year":"2019","unstructured":"Kelsey Dun . 2019 . Master\u2019s Thesis: Replicability and Uniqueness of Tremor Characteristics in Parkinson\u2019s Disease. (2019). Kelsey Dun. 2019. Master\u2019s Thesis: Replicability and Uniqueness of Tremor Characteristics in Parkinson\u2019s Disease. (2019)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20226454"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Simson\u00a0L Garfinkel. 2010. Digital forensics research: The next 10 years. digital investigation 7(2010) S64\u2013S73.  Simson\u00a0L Garfinkel. 2010. Digital forensics research: The next 10 years. digital investigation 7(2010) S64\u2013S73.","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2952858"},{"volume-title":"A guide to understanding covert channel analysis of trusted systems. Vol.\u00a030","author":"Gligor D","key":"e_1_3_2_1_16_1","unstructured":"Virgil\u00a0 D Gligor . 1994. A guide to understanding covert channel analysis of trusted systems. Vol.\u00a030 . National Computer Security Center . Virgil\u00a0D Gligor. 1994. A guide to understanding covert channel analysis of trusted systems. Vol.\u00a030. National Computer Security Center."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"W Goepel J Hesse and JN Zemel. 1994. Sensors\u2013A Comprehensive Survey Fundamentals and General Aspects.  W Goepel J Hesse and JN Zemel. 1994. Sensors\u2013A Comprehensive Survey Fundamentals and General Aspects.","DOI":"10.1002\/9783527619269"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"DA Gurnett WS Kurth LF Burlaga and NF Ness. 2013. In situ observations of interstellar plasma with Voyager 1. Science 341 6153 (2013) 1489\u20131492.  DA Gurnett WS Kurth LF Burlaga and NF Ness. 2013. In situ observations of interstellar plasma with Voyager 1. Science 341 6153 (2013) 1489\u20131492.","DOI":"10.1126\/science.1241681"},{"key":"e_1_3_2_1_19_1","volume-title":"Clinical expression of essential tremor: effects of gender and age. Movement disorders 12, 6","author":"Hubble JP","year":"1997","unstructured":"JP Hubble , KL Busenbark , R Pahwa , K Lyons , and WC Koller . 1997. Clinical expression of essential tremor: effects of gender and age. Movement disorders 12, 6 ( 1997 ), 969\u2013972. JP Hubble, KL Busenbark, R Pahwa, K Lyons, and WC Koller. 1997. Clinical expression of essential tremor: effects of gender and age. Movement disorders 12, 6 (1997), 969\u2013972."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.925384"},{"key":"e_1_3_2_1_22_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky , Dan Boneh , and Gabi Nakibly . 2014 . Gyrophone: Recognizing speech from gyroscope signals . In 23rd USENIX Security Symposium (USENIX Security 14) . 1053\u20131067. Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing speech from gyroscope signals. In 23rd USENIX Security Symposium (USENIX Security 14). 1053\u20131067."},{"key":"e_1_3_2_1_23_1","unstructured":"Oana Miu Adrian Zamfir and Corneliu Florea. 2016. Person Identification Based on Hand Tremor Characteristics. arXiv preprint arXiv:1606.06840(2016).  Oana Miu Adrian Zamfir and Corneliu Florea. 2016. Person Identification Based on Hand Tremor Characteristics. arXiv preprint arXiv:1606.06840(2016)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/03610928608829122"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.264"},{"key":"e_1_3_2_1_26_1","first-page":"1","article-title":"Leveraging side-channel information for disassembly and security","volume":"16","author":"Park Jungmin","year":"2019","unstructured":"Jungmin Park , Fahim Rahman , Apostol Vassilev , Domenic Forte , and Mark Tehranipoor . 2019 . Leveraging side-channel information for disassembly and security . ACM Journal on Emerging Technologies in Computing Systems (JETC) 16 , 1(2019), 1 \u2013 21 . Jungmin Park, Fahim Rahman, Apostol Vassilev, Domenic Forte, and Mark Tehranipoor. 2019. Leveraging side-channel information for disassembly and security. ACM Journal on Emerging Technologies in Computing Systems (JETC) 16, 1(2019), 1\u201321.","journal-title":"ACM Journal on Emerging Technologies in Computing Systems (JETC)"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2019.8739236"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.506761"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT.2016.7571953"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516770"},{"key":"e_1_3_2_1_31_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Son Yunmok","year":"2015","unstructured":"Yunmok Son , Hocheol Shin , Dongkwan Kim , Youngseok Park , Juhwan Noh , Kibum Choi , Jungwoo Choi , and Yongdae Kim . 2015 . Rocking drones with intentional sound noise on gyroscopic sensors . In 24th USENIX Security Symposium (USENIX Security 15) . 881\u2013896. Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th USENIX Security Symposium (USENIX Security 15). 881\u2013896."},{"key":"e_1_3_2_1_32_1","volume-title":"Systematic classification of side-channel attacks: A case study for mobile devices","author":"Spreitzer Raphael","year":"2017","unstructured":"Raphael Spreitzer , Veelasha Moonsamy , Thomas Korak , and Stefan Mangard . 2017. Systematic classification of side-channel attacks: A case study for mobile devices . IEEE communications surveys & tutorials 20, 1 ( 2017 ), 465\u2013488. Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, and Stefan Mangard. 2017. Systematic classification of side-channel attacks: A case study for mobile devices. IEEE communications surveys & tutorials 20, 1 (2017), 465\u2013488."},{"key":"e_1_3_2_1_33_1","volume-title":"Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Sugawara Takeshi","year":"2020","unstructured":"Takeshi Sugawara , Benjamin Cyr , Sara Rampazzi , Daniel Genkin , and Kevin Fu . 2020 . Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. In 29th USENIX Security Symposium (USENIX Security 20) . 2631\u20132648. Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, and Kevin Fu. 2020. Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. In 29th USENIX Security Symposium (USENIX Security 20). 2631\u20132648."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.003"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/0924-980X(96)94658-5"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354195"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2008.10.040"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00026"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18093004"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020252"},{"key":"e_1_3_2_1_42_1","unstructured":"YongBin Zhou and DengGuo Feng. 2005. Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing. Cryptology ePrint Archive(2005).  YongBin Zhou and DengGuo Feng. 2005. Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing. Cryptology ePrint Archive(2005)."},{"key":"e_1_3_2_1_43_1","volume-title":"Image registration methods: a survey. Image and vision computing 21, 11","author":"Zitova Barbara","year":"2003","unstructured":"Barbara Zitova and Jan Flusser . 2003. Image registration methods: a survey. Image and vision computing 21, 11 ( 2003 ), 977\u20131000. Barbara Zitova and Jan Flusser. 2003. Image registration methods: a survey. Image and vision computing 21, 11 (2003), 977\u20131000."}],"event":{"name":"NSPW '22: New Security Paradigms Workshop","acronym":"NSPW '22","location":"North Conway NH USA"},"container-title":["Proceedings of the 2022 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584318.3584321","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3584318.3584321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:54Z","timestamp":1750182534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584318.3584321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,24]]},"references-count":43,"alternative-id":["10.1145\/3584318.3584321","10.1145\/3584318"],"URL":"https:\/\/doi.org\/10.1145\/3584318.3584321","relation":{},"subject":[],"published":{"date-parts":[[2022,10,24]]},"assertion":[{"value":"2023-06-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}