{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:10:06Z","timestamp":1755900606188,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IUCRC-1916762, 2330264"],"award-info":[{"award-number":["IUCRC-1916762, 2330264"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1145\/3734477.3734704","type":"proceedings-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T21:11:01Z","timestamp":1751058661000},"page":"100-111","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ARMOUR US: Android Runtime Zero-permission Sensor Usage Monitoring from User Space"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3429-7127","authenticated-orcid":false,"given":"Yan","family":"Long","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1444-2056","authenticated-orcid":false,"given":"Jiancong","family":"Cui","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5149-7913","authenticated-orcid":false,"given":"Yuqing","family":"Yang","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8026-4919","authenticated-orcid":false,"given":"Tobias","family":"Alam","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6527-5994","authenticated-orcid":false,"given":"Zhiqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5770-6421","authenticated-orcid":false,"given":"Kevin","family":"Fu","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. AccuBattery. https:\/\/accubatteryapp.com\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2025. Access Dots - iOS cam\/mic\/gps. https:\/\/play.google.com\/store\/apps\/details?id=you.in.spark.access.dots&hl=en_US"},{"key":"e_1_3_2_1_3_1","unstructured":"2025. Safe Dot. https:\/\/github.com\/kamaravichow\/safe-dot-android?tab=readmeov-file"},{"key":"e_1_3_2_1_4_1","volume-title":"Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers. arXiv preprint arXiv:1907.05972","author":"Anand S Abhishek","year":"2019","unstructured":"S Abhishek Anand, ChenWang, Jian Liu, Nitesh Saxena, and Yingying Chen. 2019. Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers. arXiv preprint arXiv:1907.05972 (2019)."},{"key":"e_1_3_2_1_5_1","unstructured":"Appfigures. 2025. Top Ranked Google Play Apps. https:\/\/appfigures.com\/topapps\/google-play\/united-states\/top-overall"},{"key":"e_1_3_2_1_6_1","unstructured":"Appsflyer. 2025. Pay for real customers not bots with advanced sensor analysis. https:\/\/www.appsflyer.com\/products\/fraud-protection\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24076"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0061-8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0346-0"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232826"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. 260--270","author":"Block Kenneth","year":"2018","unstructured":"Kenneth Block and Guevara Noubir. 2018. My magnetometer is telling you where i've been? a mobile device permissionless location attack. In Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. 260--270."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3396261"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607203"},{"key":"e_1_3_2_1_15_1","first-page":"9","article-title":"TouchLogger: inferring keystrokes on touch screen from smartphone motion","volume":"11","author":"Cai Liang","year":"2011","unstructured":"Liang Cai and Hao Chen. 2011. TouchLogger: inferring keystrokes on touch screen from smartphone motion. HotSec 11, 2011 (2011), 9.","journal-title":"HotSec"},{"key":"e_1_3_2_1_16_1","volume-title":"Sbom vulnerability assessment & corresponding requirements. NTIA Response to Notice and Request for Comments on Software Bill of Materials Elements and Considerations","author":"Jean Camp L","year":"2021","unstructured":"L Jean Camp and Vafa Andalibi. 2021. Sbom vulnerability assessment & corresponding requirements. NTIA Response to Notice and Request for Comments on Software Bill of Materials Elements and Considerations (2021)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329817"},{"key":"e_1_3_2_1_18_1","first-page":"10","article-title":"Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis","volume":"17","author":"Continella Andrea","year":"2017","unstructured":"Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, Giovanni Vigna, et al. 2017. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. In NDSS, Vol. 17. 10--14722.","journal-title":"NDSS"},{"key":"e_1_3_2_1_19_1","unstructured":"International Data Corporation. 2023. Smartphone Market Share. https:\/\/www.idc.com\/promo\/smartphone-market-share"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243860"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081600"},{"key":"e_1_3_2_1_22_1","unstructured":"Android Developers. 2018. Android 9 behavior changes. https:\/\/developer.android.com\/about\/versions\/pie\/android-9.0-changes-all#bg-sensor-access"},{"key":"e_1_3_2_1_23_1","unstructured":"Android Developers. 2021. Android 12 behavior changes. https:\/\/developer.android.com\/about\/versions\/12\/behavior-changes-12#motionsensor-rate-limiting"},{"key":"e_1_3_2_1_24_1","unstructured":"Android Developers. 2023. Manifest.permission: HIGH_SAMPLING_RATE_SENSORS. https:\/\/developer.android.com\/reference\/android\/Manifest.permission#HIGH_SAMPLING_RATE_SENSORS"},{"key":"e_1_3_2_1_25_1","unstructured":"Android Developers. 2023. Monitoring Sensor Events. https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview#sensors-monitor"},{"key":"e_1_3_2_1_26_1","unstructured":"Android Developers. 2025. Create your own accessibility service. https:\/\/developer.android.com\/guide\/topics\/ui\/accessibility\/service"},{"key":"e_1_3_2_1_27_1","unstructured":"Android Developers. 2025. Sensor Rate-Limiting. https:\/\/developer.android.com\/develop\/sensors-and-location\/sensors\/sensors_overview#sensors-rate-limiting"},{"key":"e_1_3_2_1_28_1","unstructured":"Android Developers. 2025. System restrictions on background work. https:\/\/developer.android.com\/develop\/background-work\/background-tasks\/bg-work-restrictions?utm_source=chatgpt.com#user-initiated-restrictions"},{"key":"e_1_3_2_1_29_1","unstructured":"e Foundation. 2024. PayPal: Data transfer to over 600 third-party companies metadata. https:\/\/community.e.foundation\/t\/paypal-data-transfer-to-over-600-third-party-companies-metadata\/61888"},{"key":"e_1_3_2_1_30_1","volume-title":"Min SH Aung, and Peter J Rentfrow","author":"Harari Gabriella M","year":"2017","unstructured":"Gabriella M Harari, Sandrine R M\u00fcller, Min SH Aung, and Peter J Rentfrow. 2017. Smartphone sensing methods for studying behavior in everyday life. Current opinion in behavioral sciences 18 (2017), 83--90."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833716"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.24"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-017-0446-0"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584318.3584321"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Yan Long Qinhong Jiang Chen Yan Tobias Alam Xiaoyu Ji Wenyuan Xu and Kevin Fu. 2024. EM Eye: Characterizing electromagnetic side-channel eavesdropping on embedded cameras. (2024).","DOI":"10.14722\/ndss.2024.24552"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179313"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212498"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19092164"},{"key":"e_1_3_2_1_39_1","volume-title":"Gyrophone: Recognizing speech from gyroscope signals. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 1053--1067.","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing speech from gyroscope signals. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 1053--1067."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0042"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.31"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON52354.2021.9491601"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.09.005"},{"key":"e_1_3_2_1_45_1","unstructured":"Android Open Source Project. 2022. Android Sensor Stack. https:\/\/source.android.com\/docs\/core\/interaction\/sensors\/sensor-stack#framework"},{"key":"e_1_3_2_1_46_1","volume-title":"Frida: A world-class dynamic instrumentation toolkit. https:\/\/frida.re\/docs\/android\/","author":"Ravn\u00e5s Ole Andr\u00e9 V.","year":"2025","unstructured":"Ole Andr\u00e9 V. Ravn\u00e5s. 2025. Frida: A world-class dynamic instrumentation toolkit. https:\/\/frida.re\/docs\/android\/"},{"key":"e_1_3_2_1_47_1","unstructured":"Google Samples. 2021. High sensor sampling rate code warning. https:\/\/googlesamples.github.io\/android-custom-lint-rules\/checks\/HighSamplingRate.md.html"},{"key":"e_1_3_2_1_48_1","volume-title":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 36--47","author":"Shamsi Nina","year":"2023","unstructured":"Nina Shamsi, Yan Long, and Kevin Fu. 2023. EyeHearYou: Probing Location Identification via Occluded Smartphone Cameras and Ultrasound. In 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 36--47."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483272"},{"key":"e_1_3_2_1_50_1","volume-title":"6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices. In USENIX Security Symposium. 397--414","author":"Sikder Amit Kumar","year":"2017","unstructured":"Amit Kumar Sikder, Hidayet Aksu, and A Selcuk Uluagac. 2017. 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices. In USENIX Security Symposium. 397--414."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3064507"},{"key":"e_1_3_2_1_52_1","unstructured":"GitHub skylot. 2025. jadx: Dex to Java decompiler. https:\/\/github.com\/skylot\/jadx"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666622"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24077"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00058"},{"key":"e_1_3_2_1_56_1","unstructured":"Verifone. 2024. PayPal Magnes. https:\/\/verifone.cloud\/docs\/online-payments\/apm\/paypal-ecom\/paypal-magnes"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179301"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699114"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560607"}],"event":{"name":"WiSec 2025: 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Arlington VA USA","acronym":"WiSec 2025"},"container-title":["18th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3734477.3734704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:46:06Z","timestamp":1755899166000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3734477.3734704"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":59,"alternative-id":["10.1145\/3734477.3734704","10.1145\/3734477"],"URL":"https:\/\/doi.org\/10.1145\/3734477.3734704","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]},"assertion":[{"value":"2025-06-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}