{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T17:31:01Z","timestamp":1769016661293,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:00:00Z","timestamp":1768953600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:00:00Z","timestamp":1768953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    Nearly all modern smartphones are now equipped with a barometer to sample air pressure. Accessing these samples is deemed harmless, hence does not require permission. In this work, we demonstrate that barometer samples can reveal sensitive information, particularly in smartphones with ingress protection. Using a support-vector machine (SVM) classifier, we demonstrate for the first time that barometer readings, even at a low sampling rate (25 Hz), can reveal smartphone speaker activity. In particular, our classifier achieves\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\ge 95\\%$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mo>\u2265<\/mml:mo>\n                            <mml:mn>95<\/mml:mn>\n                            <mml:mo>%<\/mml:mo>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    accuracy in detecting whether the speaker is silent or playing a ringtone. In addition, we show that low-rate barometer samples can be used to 1)\u00a0detect touchscreen finger taps with nearly\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$100\\%$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mn>100<\/mml:mn>\n                            <mml:mo>%<\/mml:mo>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    accuracy, and 2) gain information about the approximate position of finger taps. Our findings underscore that the barometer sensor, often considered harmless, should be recognized as sensitive with regard to user privacy, and access to this sensor should be carefully managed.\n                  <\/jats:p>","DOI":"10.1186\/s42400-025-00401-5","type":"journal-article","created":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T02:02:15Z","timestamp":1768960935000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Smartphone barometer can hear, and sense finger taps"],"prefix":"10.1186","volume":"9","author":[{"given":"Alireza","family":"Hafez","sequence":"first","affiliation":[]},{"given":"Dorsa","family":"Nahid","sequence":"additional","affiliation":[]},{"given":"Majid","family":"Khabbazian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,21]]},"reference":[{"key":"401_CR1","doi-asserted-by":"crossref","unstructured":"Anand SA, Saxena N (2018) Speechless: Analyzing the threat to speech privacy from smartphone motion sensors. In: 2018 IEEE symposium on security and privacy (SP), pp 1000\u20131017. IEEE","DOI":"10.1109\/SP.2018.00004"},{"key":"401_CR2","doi-asserted-by":"crossref","unstructured":"Aviv AJ, Sapp B, Blaze M, Smith JM (2012) Practicality of accelerometer side channels on smartphones. In: Proceedings of the 28th annual computer security applications conference, pp 41\u201350","DOI":"10.1145\/2420950.2420957"},{"key":"401_CR3","doi-asserted-by":"crossref","unstructured":"Backes M, Gerling S, Hammer C, Maffei M, Styp-Rekowsky P (2013) AppGuard - enforcing user requirements on android apps. In: Tools and algorithms for the construction and analysis of systems (TACAS), vol 7795, pp 543\u2013548","DOI":"10.1007\/978-3-642-36742-7_39"},{"key":"401_CR4","doi-asserted-by":"crossref","unstructured":"Ba Z, Zheng T, Zhang X, Qin Z, Li B, Liu X, Ren K (2020) Learning-based practical smartphone eavesdropping with built-in accelerometer. In: NDSS, vol. 2020, pp 1\u201318","DOI":"10.14722\/ndss.2020.24076"},{"issue":"11","key":"401_CR5","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/S0262-1762(09)70418-3","volume":"2009","author":"HP Bloch","year":"2009","unstructured":"Bloch HP (2009) Ingress protection code explained. World Pumps 2009(11):26","journal-title":"World Pumps"},{"key":"401_CR6","doi-asserted-by":"crossref","unstructured":"Chen H, Li F, Du W, Yang S, Conn M, Wang Y (2020) Listen to your fingers: user authentication based on geometry biometrics of touch gesture. In: Proceedings of the ACM on interactive mobile wearable and ubiquitous technologies 4(3), pp 1\u201323","DOI":"10.1145\/3411809"},{"key":"401_CR7","doi-asserted-by":"crossref","unstructured":"Chen Y, Ni T, Xu W, Gu T (2022) Swipepass: acoustic-based second-factor user authentication for smartphones. In: Proceedings of the ACM on interactive mobile wearable and ubiquitous technologies 6(3), pp 1\u201325","DOI":"10.1145\/3550292"},{"issue":"4","key":"401_CR8","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0167-4048(85)90046-X","volume":"4","author":"W Eck","year":"1985","unstructured":"Eck W (1985) Electromagnetic radiation from video display units: an eavesdropping risk? Comput Secur 4(4):269\u2013286","journal-title":"Comput Secur"},{"key":"401_CR9","doi-asserted-by":"crossref","unstructured":"Felt AP, Chin E, Hanna S, Song D, Wagner DA (2011) Android permissions demystified. In: ACM conference on computer and communications security (CCS), pp 627\u2013638","DOI":"10.1145\/2046707.2046779"},{"key":"401_CR10","doi-asserted-by":"crossref","unstructured":"Gibler C, Crussell J, Erickson J, Chen H (2012) Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E.R., Camp, L.J., Volkamer, M., Reiter, M.K., Zhang, X. (eds) Trust and trustworthy computing (TRUST), vol 7344, pp 291\u2013307","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"401_CR11","unstructured":"High-performance MEMS nano pressure sensor: 260-1260 hPa absolute digital output barometer. https:\/\/www.st.com\/resource\/en\/datasheet\/lps22hh.pdf. Accessed: 2023-05-24 (LPS22HH)"},{"key":"401_CR12","doi-asserted-by":"crossref","unstructured":"Ho B, Martin PD, Swaminathan P, Srivastava MB (2015) From pressure to path: Barometer-based vehicle tracking. In: ACM international conference on embedded systems for energy-efficient built environments (BuildSys), pp 65\u201374","DOI":"10.1145\/2821650.2821665"},{"key":"401_CR13","doi-asserted-by":"crossref","unstructured":"Huang W, Chen H, Cao H, Ren J, Jiang H, Fu Z, Zhang Y (2024) Manipulating voice assistants eavesdropping via inherent vulnerability unveiling in mobile systems. IEEE Trans Mobile Comput","DOI":"10.1109\/TMC.2024.3401096"},{"key":"401_CR14","doi-asserted-by":"crossref","unstructured":"Liu X, Zhou Z, Diao W, Li Z, Zhang K (2015) When good becomes evil: Keystroke inference with smartwatch. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 1273\u20131285","DOI":"10.1145\/2810103.2813668"},{"key":"401_CR15","doi-asserted-by":"crossref","unstructured":"Lu L, Yu J, Chen Y, Zhu Y, Xu X, Xue G, Li M (2019) Keylistener: Inferring keystrokes on qwerty keyboard of touch screen through acoustic signals. In: IEEE INFOCOM 2019-IEEE conference on computer communications, pp 775\u2013783. IEEE","DOI":"10.1109\/INFOCOM.2019.8737591"},{"key":"401_CR16","unstructured":"Michalevsky Y, Boneh D, Nakibly G (2014) Gyrophone: Recognizing speech from gyroscope signals. In: USENIX security symposium (USENIX Security 14), pp 1053\u20131067"},{"key":"401_CR17","doi-asserted-by":"crossref","unstructured":"Muralidharan K, Khan AJ, Misra A, Balan RK, Agarwal S (2014) Barometric phone sensors: more hype than hope! In: ACM workshop on mobile computing systems and applications (HotMobile), pp 12\u20131126","DOI":"10.1145\/2565585.2565596"},{"key":"401_CR18","doi-asserted-by":"crossref","unstructured":"Ni T, Chen Y, Xu W, Xue L, Zhao Q (2023) Xporter: A study of the multi-port charger security on privacy leakage and voice injection. In: Proceedings of the 29th annual international conference on mobile computing and networking, pp 1\u201315","DOI":"10.1145\/3570361.3613293"},{"key":"401_CR19","doi-asserted-by":"crossref","unstructured":"Ni T, Zhang X, Zhao Q (2023) Recovering fingerprints from in-display fingerprint sensors via electromagnetic side channel. In: Proceedings of the 2023 ACM SIGSAC conference on computer and communications security, pp 253\u2013267","DOI":"10.1145\/3576915.3623153"},{"key":"401_CR20","doi-asserted-by":"crossref","unstructured":"Owusu E, Han J, Das S, Perrig A, Zhang J (2012) ACCessory: password inference using accelerometers on smartphones. In: ACM workshop on mobile computing systems and applications (HotMobile), pp 1\u20136","DOI":"10.1145\/2162081.2162095"},{"key":"401_CR21","doi-asserted-by":"crossref","unstructured":"Owusu E, Han J, Das S, Perrig A, Zhang J (2012) Accessory: password inference using accelerometers on smartphones. In: Proceedings of the twelfth workshop on mobile computing systems & applications, pp 1\u20136","DOI":"10.1145\/2162081.2162095"},{"key":"401_CR22","doi-asserted-by":"crossref","unstructured":"Quinn P (2019) Estimating touch force with barometric pressure sensors. In: ACM conference on human factors in computing systems (CHI), pp 1\u20137","DOI":"10.1145\/3290605.3300919"},{"key":"401_CR23","doi-asserted-by":"crossref","unstructured":"Sankaran K, Zhu M, Guo XF, Ananda AL, Chan MC, Peh L-S (2014) Using mobile phone barometer for low-power transportation context detection. In: ACM conference on embedded network sensor systems, pp 191\u2013205","DOI":"10.1145\/2668332.2668343"},{"key":"401_CR24","doi-asserted-by":"crossref","unstructured":"Sankaran K, Zhu M, Guo X, Ananda AL, Chan MC, Peh L (2014) Using mobile phone barometer for low-power transportation context detection. In: ACM conference on embedded network sensor systems (SenSys), pp 191\u2013205","DOI":"10.1145\/2668332.2668343"},{"key":"401_CR25","doi-asserted-by":"crossref","unstructured":"Simon L, Anderson RJ (2013) PIN skimmer: inferring pins through the camera and microphone. In: ACM workshop on security and privacy in smartphones and mobile devices, pp 67\u201378","DOI":"10.1145\/2516760.2516770"},{"issue":"1","key":"401_CR26","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/COMST.2017.2779824","volume":"20","author":"R Spreitzer","year":"2017","unstructured":"Spreitzer R, Moonsamy V, Korak T, Mangard S (2017) Systematic classification of side-channel attacks: a case study for mobile devices. IEEE Commun Surveys Tutorials 20(1):465\u2013488","journal-title":"IEEE Commun Surveys Tutorials"},{"key":"401_CR27","doi-asserted-by":"crossref","unstructured":"Taher F, Alexander J, Hardy J, Velloso E (2014) An empirical characterization of touch-gesture input-force on mobile devices. In: ACM international conference on interactive tabletops and surfaces (ITS), pp 195\u2013204","DOI":"10.1145\/2669485.2669515"},{"key":"401_CR28","doi-asserted-by":"crossref","unstructured":"Vanini S, Giordano S (2013) Adaptive context-agnostic floor transition detection on smart mobile devices. In: IEEE international conference on pervasive computing and communications workshops (PERCOM), pp 2\u20137","DOI":"10.1109\/PerComW.2013.6529447"},{"key":"401_CR29","doi-asserted-by":"crossref","unstructured":"Wang H, Lai TT-T, Roy\u00a0Choudhury R (2015) Mole: motion leaks through smartwatch sensors. In: Proceedings of the 21st annual international conference on mobile computing and networking, pp 155\u2013166","DOI":"10.1145\/2789168.2790121"},{"key":"401_CR30","doi-asserted-by":"crossref","unstructured":"Wu M, Pathak PH, Mohapatra P (2015) Monitoring building door events using barometer sensor in smartphones. In: ACM International joint conference on pervasive and ubiquitous computing (UbiComp), pp 319\u2013323","DOI":"10.1145\/2750858.2804257"},{"issue":"1","key":"401_CR31","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/JIOT.2022.3199657","volume":"10","author":"M Yao","year":"2023","unstructured":"Yao M, Tao D, Gao R, Wang J, Helal S, Mao S (2023) Pressafe: barometer-based on-screen pressure-assisted implicit authentication for smartphones. IEEE Internet Things J 10(1):285\u2013299","journal-title":"IEEE Internet Things J"},{"key":"401_CR32","doi-asserted-by":"publisher","first-page":"42757","DOI":"10.1109\/ACCESS.2019.2904654","volume":"7","author":"Q Yu","year":"2019","unstructured":"Yu Q, Xiong R, Li C, Pecht MG (2019) Water-resistant smartphone technologies. IEEE Access 7:42757\u201342773","journal-title":"IEEE Access"},{"key":"401_CR34","doi-asserted-by":"crossref","unstructured":"Zhang J, Edwan E, Zhou J, Chai W, Loffeld O (2012) Performance investigation of barometer aided GPS\/MEMS-IMU integration. In: IEEE\/ION position, location and navigation symposium, pp 598\u2013604","DOI":"10.1109\/PLANS.2012.6236933"},{"key":"401_CR35","doi-asserted-by":"crossref","unstructured":"Zhang J, Edwan E, Zhou J, Chai W, Loffeld O (2024) Performance investigation of barometer aided GPS\/MEMS-IMU integration. In: IEEE\/ION position, location and navigation symposium, pp 598\u2013604","DOI":"10.1109\/PLANS.2012.6236933"},{"key":"401_CR36","doi-asserted-by":"crossref","unstructured":"Zhang L, Pathak PH, Wu M, Zhao Y, Mohapatra P (2015) Accelword: Energy efficient hotword detection through accelerometer. In: Proceedings of the 13th annual international conference on mobile systems, applications, and services, pp 301\u2013315","DOI":"10.1145\/2742647.2742658"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00401-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00401-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00401-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T02:02:19Z","timestamp":1768960939000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00401-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,21]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["401"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00401-5","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,21]]},"assertion":[{"value":"10 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"15"}}