{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:07:15Z","timestamp":1766268435754,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF","award":["1845300"],"award-info":[{"award-number":["1845300"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3617072.3617113","type":"proceedings-article","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T17:47:04Z","timestamp":1697219224000},"page":"158-174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["\u201cSomeone Definitely Used 0000\u201d: Strategies, Performance, and User Perception of Novice Smartphone-Unlock PIN-Guessers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-4749-6448","authenticated-orcid":false,"given":"Daniel V.","family":"Bailey","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1987-1685","authenticated-orcid":false,"given":"Collins W.","family":"Munyendo","sequence":"additional","affiliation":[{"name":"The George Washington University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9813-4545","authenticated-orcid":false,"given":"Hunter A.","family":"Dyer","sequence":"additional","affiliation":[{"name":"Sandia National Labs, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7120-1019","authenticated-orcid":false,"given":"Miles","family":"Grant","sequence":"additional","affiliation":[{"name":"The George Washington University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9232-4496","authenticated-orcid":false,"given":"Philipp","family":"Markert","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3792-2485","authenticated-orcid":false,"given":"Adam J.","family":"Aviv","sequence":"additional","affiliation":[{"name":"The George Washington University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_2_1_2_1","volume-title":"The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior Among Saudi Arabians. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201918)","author":"Qahtani Elham Al","year":"2018","unstructured":"Elham Al Qahtani, Mohamed Shehab, and Abrar Aljohani. 2018. The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior Among Saudi Arabians. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201918). USENIX, Baltimore, Maryland, USA, 31\u201346."},{"key":"e_1_3_2_1_3_1","volume-title":"Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201917)","author":"Albayram Yusuf","year":"2017","unstructured":"Yusuf Albayram, Mohammad Maifi\u00a0Hasan Khan, Theodore Jensen, and Nhan Nguyen. 2017. \u201c...better to use a lock screen than to worry about saving a few seconds of time\u201d: Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201917). USENIX, Santa Clara, California, USA, 49\u201363."},{"key":"e_1_3_2_1_4_1","unstructured":"Daniel Amitay. 2011. Most Common iPhone Passcodes. http:\/\/danielamitay.com\/blog\/2011\/6\/13\/most-common-iphone-passcodes as of 2023\/09\/24 21:06:10."},{"key":"e_1_3_2_1_5_1","volume-title":"Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method. In Conference on Human Aspects of Information Security, Privacy and Trust(HAS\u00a0\u201914)","author":"Andriotis Panagiotis","year":"2014","unstructured":"Panagiotis Andriotis, Theo Tryfonas, and George Oikonomou. 2014. Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method. In Conference on Human Aspects of Information Security, Privacy and Trust(HAS\u00a0\u201914). Springer, Heraklion, Crete, Greece, 115\u2013126."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462098"},{"key":"e_1_3_2_1_7_1","unstructured":"Android Open Source Project. 2021. Android 13: GateKeeper \u2013 ComputeRetryTimeout Function. https:\/\/android.googlesource.com\/platform\/system\/gatekeeper\/+\/refs\/heads\/android13-release\/gatekeeper.cpp#282 as of 2023\/09\/24 21:06:10."},{"volume-title":"iOS 9 Preview. https:\/\/web.archive.org\/web\/20150608223846http:\/\/www.apple.com\/ios\/ios9-preview\/, as of","year":"2015","key":"e_1_3_2_1_8_1","unstructured":"Apple. 2015. iOS 9 Preview. https:\/\/web.archive.org\/web\/20150608223846http:\/\/www.apple.com\/ios\/ios9-preview\/, as of June 8, 2015."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818014"},{"key":"e_1_3_2_1_10_1","volume-title":"Towards Baselines for Shoulder Surfing on Mobile Authentication. In Annual Conference on Computer Security Applications(ACSAC\u00a0\u201917)","author":"Aviv J.","year":"2017","unstructured":"Adam\u00a0J. Aviv, John\u00a0T. Davin, Flynn Wolf, and Ravi Kuber. 2017. Towards Baselines for Shoulder Surfing on Mobile Authentication. In Annual Conference on Computer Security Applications(ACSAC\u00a0\u201917). ACM, Orlando, Florida, USA, 486\u2013498."},{"key":"e_1_3_2_1_11_1","volume-title":"Smudge Attacks on Smartphone Touch Screens. In USENIX Workshop on Offensive Technologies(WOOT\u00a0\u201910)","author":"Aviv J.","year":"2010","unstructured":"Adam\u00a0J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan\u00a0M. Smith. 2010. Smudge Attacks on Smartphone Touch Screens. In USENIX Workshop on Offensive Technologies(WOOT\u00a0\u201910). USENIX, Washington, District of Columbia, USA, 1\u20137."},{"key":"e_1_3_2_1_12_1","volume-title":"Comparing Video Based Shoulder Surfing with Live Simulation and Towards Baselines for Shoulder Surfing on Mobile Authentication. In Annual Conference on Computer Security Applications(ACSAC\u00a0\u201918)","author":"Aviv J.","year":"2018","unstructured":"Adam\u00a0J. Aviv, Flynn Wolf, and Ravi Kuber. 2018. Comparing Video Based Shoulder Surfing with Live Simulation and Towards Baselines for Shoulder Surfing on Mobile Authentication. In Annual Conference on Computer Security Applications(ACSAC\u00a0\u201918). ACM, San Juan, Puerto Rico, USA, 453\u2013466."},{"key":"e_1_3_2_1_13_1","volume-title":"Enthusiastic and Casual Signal Users\u2019 Understanding of Signal PINs. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201921)","author":"Bailey V.","year":"2021","unstructured":"Daniel\u00a0V. Bailey, Philipp Markert, and Adam\u00a0J. Aviv. 2021. \u201cI have no idea what they\u2019re trying to accomplish:\u201d Enthusiastic and Casual Signal Users\u2019 Understanding of Signal PINs. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201921). USENIX, Virtual Conference, 417\u2013436."},{"volume-title":"Financial Cryptography and Data Security(FC\u00a0\u201912)","author":"Bonneau Joseph","key":"e_1_3_2_1_14_1","unstructured":"Joseph Bonneau, S\u00f6ren Preibusch, and Ross Anderson. 2012. A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. In Financial Cryptography and Data Security(FC\u00a0\u201912). Springer, Kralendijk, Bonaire, 25\u201340."},{"key":"e_1_3_2_1_15_1","volume-title":"Virtual Conference, 1\u20137.","author":"Casimiro Maria","year":"2020","unstructured":"Maria Casimiro, Joe Segel, Lewei Li, Yigeng Wang, and Lorrie\u00a0Faith Cranor. 2020. A Quest for Inspiration: How Users Create and Reuse PINs. In Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201920). Virtual Conference, 1\u20137."},{"key":"e_1_3_2_1_16_1","volume-title":"Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks. In ACM Asia Conference on Computer and Communications Security(ASIA\u00a0CCS\u00a0\u201917)","author":"Cha Seunghun","year":"2017","unstructured":"Seunghun Cha, Sungsu Kwag, Hyoungshick Kim, and Jun\u00a0Ho Huh. 2017. Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks. In ACM Asia Conference on Computer and Communications Security(ASIA\u00a0CCS\u00a0\u201917). ACM, Abu Dhabi, United Arab Emirates, 313\u2013326."},{"key":"e_1_3_2_1_17_1","volume-title":"Technology-Filled World. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201914)","author":"Cranor Lorrie\u00a0Faith","year":"2014","unstructured":"Lorrie\u00a0Faith Cranor, Adam\u00a0L. Durity, Abigail Marsh, and Blase Ur. 2014. Parents\u2019 and Teens\u2019 Perspectives on Privacy In a Technology-Filled World. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201914). USENIX, Menlo Park, California, USA, 19\u201335."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_2_1_20_1","unstructured":"Cyrus Farivar. 2015. Apple to Require 6-digit Passcodes on Newer iPhones iPads Under iOS 9. https:\/\/arstechnica.com\/?post_type=post&p=679147 as of 2023\/09\/24 21:06:10."},{"key":"e_1_3_2_1_21_1","volume-title":"Technological Advisory Council","author":"Federal Communications Commission","year":"2018","unstructured":"Federal Communications Commission. 2018. Technological Advisory Council (TAC) Mobile Device Theft Prevention (MDTP) Working Group. https:\/\/transition.fcc.gov\/bureaus\/oet\/tac\/tacdocs\/reports\/2018\/11.30.18-MDTP-WG-Report-and-Recommendations.pdf."},{"key":"e_1_3_2_1_22_1","unstructured":"Federal Trade Commission. 2022. How to Protect Your Phone from Hackers. https:\/\/consumer.ftc.gov\/articles\/how-protect-your-phone-hackers."},{"key":"e_1_3_2_1_23_1","unstructured":"Google Developers. 2022. Android 13 Developer Preview. https:\/\/developer.android.com\/about\/versions\/13 as of 2023\/09\/24 21:06:10."},{"key":"e_1_3_2_1_24_1","volume-title":"Symposium on Usable Privacy and Security(SOUPS \u201914)","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It\u2019s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In Symposium on Usable Privacy and Security(SOUPS \u201914). USENIX, Menlo Park, California, USA, 213\u2013230."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518953"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427240"},{"volume-title":"Knowledge and Feelings Surrounding Smartphone Security and Privacy. In Mobile Security Technologies(MoST\u00a0\u201915).","author":"Kraus Lydia","key":"e_1_3_2_1_27_1","unstructured":"Lydia Kraus, Tobias Fiebig, Viktor Miruchna, Sebastian M\u00f6ller, and Asaf Shabtai. 2015. Analyzing End-Users\u2019 Knowledge and Feelings Surrounding Smartphone Security and Privacy. In Mobile Security Technologies(MoST\u00a0\u201915). San Jose, California, USA."},{"key":"e_1_3_2_1_28_1","volume-title":"On User Choice for Android Unlock Patterns. In European Workshop on Usable Security(EuroUSEC\u00a0\u201916)","author":"L\u00f8ge Marte","year":"2016","unstructured":"Marte L\u00f8ge, Markus D\u00fcrmuth, and Lillian R\u00f8stad. 2016. On User Choice for Android Unlock Patterns. In European Workshop on Usable Security(EuroUSEC\u00a0\u201916). ISOC, Darmstadt, Germany."},{"key":"e_1_3_2_1_29_1","volume-title":"Android Users in the Wild: Their Authentication and Usage Behavior. Pervasive and Mobile Computing 32 (Oct","author":"Mahfouzab Ahmed","year":"2016","unstructured":"Ahmed Mahfouzab, Ildar Muslukhova, and Konstantin Beznosova. 2016. Android Users in the Wild: Their Authentication and Usage Behavior. Pervasive and Mobile Computing 32 (Oct. 2016), 50\u201361."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473040"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300819"},{"key":"e_1_3_2_1_32_1","volume-title":"Snooping on Mobile Phones: Prevalence and Trends. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201916)","author":"Marques Diogo","year":"2016","unstructured":"Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Lu\u00eds Carri\u00e7o, and Konstantin Beznosov. 2016. Snooping on Mobile Phones: Prevalence and Trends. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201916). USENIX, Denver, Colorado, USA, 159\u2013174."},{"key":"e_1_3_2_1_33_1","volume-title":"Study of Everyday Device & Account Sharing in Households. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201916)","author":"Liao Tara","year":"2016","unstructured":"Matthews, Tara and Liao, Kerwell and Turner, Anna and Berkovich, Marianne and Reeder, Rob and Consolvo, Sunny. 2016. \u201cShe\u2019ll just grab any device that\u2019s closer\u201d: A Study of Everyday Device & Account Sharing in Households. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201916). ACM, San Jose, California, USA, 5921\u20135932."},{"key":"e_1_3_2_1_34_1","volume-title":"Usability and Security of Text Passwords on Mobile Devices. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201916)","author":"Melicher William","year":"2016","unstructured":"William Melicher, Darya Kurilova, Sean\u00a0M. Segreti, Pranshu Kalvani, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie\u00a0Faith Cranor, and Michelle\u00a0L. Mazurek. 2016. Usability and Security of Text Passwords on Mobile Devices. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201916). ACM, San Jose, California, USA, 527\u2013539."},{"key":"e_1_3_2_1_35_1","volume-title":"Symposium on Usable Privacy and Security(SOUPS\u00a0\u201921)","author":"Munyendo W.","year":"2021","unstructured":"Collins\u00a0W. Munyendo, Miles Grant, Philipp Markert, Timothy\u00a0J. Forman, and Adam\u00a0J. Aviv. 2021. Using a Blocklist to Improve the Security of User Selection of Android Patterns. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201921). USENIX, Virtual Conference, 37\u201356."},{"key":"e_1_3_2_1_36_1","volume-title":"Digits. In USENIX Security Symposium(SSYM\u00a0\u201922)","author":"Munyendo W.","year":"2022","unstructured":"Collins\u00a0W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, and Adam\u00a0J. Aviv. 2022. \u201cThe Same PIN, Just Longer\u201d: On the (In)Security of Upgrading PINs from 4 to 6 Digits. In USENIX Security Symposium(SSYM\u00a0\u201922). USENIX, Boston, Massachusetts, USA."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493223"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100273"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2017.01.006"},{"key":"e_1_3_2_1_40_1","unstructured":"Mishaal Rahman. 2023. Android 14 Could Let You Clone Apps. https:\/\/www.xda-developers.com\/android-14-app-cloning\/ as of 2023\/09\/24 21:06:10."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179348"},{"key":"e_1_3_2_1_44_1","volume-title":"Women in South Asia. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201918)","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura\u00a0Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. \u201cPrivacy is not for me, it\u2019s for those rich women\u201d: Performative Privacy Practices on Mobile Phones by Women in South Asia. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201918). USENIX, Baltimore, Maryland, USA, 127\u2013142."},{"key":"e_1_3_2_1_45_1","volume-title":"On the Security of LG\u2019s Knock Codes. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201920)","author":"Samuel Raina","year":"2020","unstructured":"Raina Samuel, Philipp Markert, Adam\u00a0J. Aviv, and Iulian Neamtiu. 2020. Knock, Knock. Who\u2019s There? On the Security of LG\u2019s Knock Codes. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201920). ACM, Virtual Conference, 37\u201359."},{"key":"e_1_3_2_1_46_1","volume-title":"Password Entry Usability and Shoulder Surfing Susceptibility on Different Smartphone Platforms. In International Conference on Mobile and Ubiquitous Multimedia(MUM\u00a0\u201912)","author":"Schaub Florian","year":"2012","unstructured":"Florian Schaub, Ruben Deyhle, and Michael Weber. 2012. Password Entry Usability and Shoulder Surfing Susceptibility on Different Smartphone Platforms. In International Conference on Mobile and Ubiquitous Multimedia(MUM\u00a0\u201912). ACM, Ulm, Germany, 13:1\u201313:10."},{"key":"e_1_3_2_1_47_1","volume-title":"Implicit Authentication Through Learning User Behavior. In International Conference on Information Security(ISC\u00a0\u201910)","author":"Shi Elaine","year":"2010","unstructured":"Elaine Shi, Yuan Niu, Markus Jakobsson, and Richard Chow. 2010. Implicit Authentication Through Learning User Behavior. In International Conference on Information Security(ISC\u00a0\u201910). Springer, Boca Raton, Florida, USA, 99\u2013113."},{"key":"e_1_3_2_1_48_1","volume-title":"International Conference on Security Protocols(SP\u00a0\u201904)","author":"Stajano Frank","year":"2004","unstructured":"Frank Stajano. 2004. One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA. In International Conference on Security Protocols(SP\u00a0\u201904). Springer, Cambridge, United Kingdom, 51\u201364."},{"key":"e_1_3_2_1_49_1","volume-title":"The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. In USENIX Security Symposium(SSYM\u00a0\u201920)","author":"Tseng Emily","year":"2020","unstructured":"Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. In USENIX Security Symposium(SSYM\u00a0\u201920). USENIX, Virtual Conference, 1893\u20131909."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"e_1_3_2_1_51_1","volume-title":"Measuring Real-World Accuracies and Biases in Modeling Password Guessability. In USENIX Security Symposium(USENIX Security 15)","author":"Ur Blase","year":"2015","unstructured":"Blase Ur, Sean\u00a0M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie\u00a0Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle\u00a0L. Mazurek, William Melicher, and Richard Shay. 2015. Measuring Real-World Accuracies and Biases in Modeling Password Guessability. In USENIX Security Symposium(USENIX Security 15). USENIX, Washington, District of Columbia, USA, 463\u2013481."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702202"},{"key":"e_1_3_2_1_53_1","volume-title":"Distribution and Security. In ACM Asia Conference on Computer and Communications Security(ASIA\u00a0CCS\u00a0\u201917)","author":"Wang Ding","year":"2017","unstructured":"Ding Wang, Qianchen Gu, Xinyi Huang, and Ping Wang. 2017. Understanding Human-Chosen PINs: Characteristics, Distribution and Security. In ACM Asia Conference on Computer and Communications Security(ASIA\u00a0CCS\u00a0\u201917). ACM, Abu Dhabi, United Arab Emirates, 372\u2013385."},{"volume-title":"28th USENIX security symposium (USENIX security 19)","author":"Wang Ding","key":"e_1_3_2_1_54_1","unstructured":"Ding Wang, Ping Wang, Debiao He, and Yuan Tian. 2019. Birthday, Name and Bifacial-Security: Understanding Passwords of Chinese Web Users. In 28th USENIX security symposium (USENIX security 19). Usenix, Santa Clara, CA, 1537\u20131555."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978339"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2935334.2935388"},{"key":"e_1_3_2_1_57_1","volume-title":"Hey Alexa What Did I Just Type? Decoding Smartphone Sounds With a Voice Assistant. CoRR abs\/2012.00687 (Dec","author":"Zarandy Almos","year":"2020","unstructured":"Almos Zarandy, Ilia Shumailov, and Ross Anderson. 2020. Hey Alexa What Did I Just Type? Decoding Smartphone Sounds With a Voice Assistant. CoRR abs\/2012.00687 (Dec. 2020), 1\u201318."}],"event":{"name":"EuroUSEC 2023: The 2023 European Symposium on Usable Security","acronym":"EuroUSEC 2023","location":"Copenhagen Denmark"},"container-title":["Proceedings of the 2023 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617072.3617113","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617072.3617113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:07Z","timestamp":1750178167000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":56,"alternative-id":["10.1145\/3617072.3617113","10.1145\/3617072"],"URL":"https:\/\/doi.org\/10.1145\/3617072.3617113","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}