{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:18Z","timestamp":1750309398263,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,4]]},"DOI":"10.1145\/3672202.3673730","type":"proceedings-article","created":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T18:27:48Z","timestamp":1722882468000},"page":"101-103","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["DEMO: Towards A Novel Ultrasonic Side-channel Attack on Mobile Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0009-0007-6573-2922","authenticated-orcid":false,"given":"Yingli","family":"Duan","sequence":"first","affiliation":[{"name":"Technical University of Denmark, Copenhagen, Denmark"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-4384-5786","authenticated-orcid":false,"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[{"name":"Technical University of Denmark, Copenhagen, Denmark"},{"name":"Lancaster University, Lancaster, United Kingdom"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-8917-4087","authenticated-orcid":false,"given":"Wei-Yang","family":"Chiu","sequence":"additional","affiliation":[{"name":"Technical University of Denmark, Copenhagen, Denmark"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-9807-2293","authenticated-orcid":false,"given":"Yu","family":"Wang","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,8,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.33"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796834"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S58398.2023.00039"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417241"},{"key":"e_1_3_2_1_5_1","volume-title":"NSS 2017, Helsinki, Finland, August 21--23, 2017, Proceedings (Lecture Notes in Computer Science), Zheng Yan, Refik Molva, Wojciech Mazurczyk, and Raimo Kantola (Eds.)","volume":"10394","author":"Jiang Lijun","year":"2017","unstructured":"Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, and Jin Li. 2017. Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. In Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21--23, 2017, Proceedings (Lecture Notes in Computer Science), Zheng Yan, Refik Molva, Wojciech Mazurczyk, and Raimo Kantola (Eds.), Vol. 10394. Springer, 199--213."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3522783.3529523"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3280064"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.03.019"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.013.2100768"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.PATREC.2021.01.019"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3139052"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103713"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2023.103204"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.064"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.SYSARC.2022.102510"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/S11036-021-01842-1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2997779"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254002"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.07.008"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.012"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2014.02.006"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2664893"},{"key":"e_1_3_2_1_23_1","volume-title":"ACNS 2016, Guildford, UK, June 19--22, 2016. Proceedings (Lecture Notes in Computer Science), Mark Manulis, Ahmad-Reza Sadeghi, and Steve A. Schneider (Eds.)","volume":"9696","author":"Meng Weizhi","year":"2016","unstructured":"Weizhi Meng, Wenjuan Li, Duncan S. Wong, and Jianying Zhou. 2016. TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones. In Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19--22, 2016. Proceedings (Lecture Notes in Computer Science), Mark Manulis, Ahmad-Reza Sadeghi, and Steve A. Schneider (Eds.), Vol. 9696. Springer, 629--647."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00462-x"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.INFFUS.2020.12.006"},{"key":"e_1_3_2_1_26_1","volume-title":"Machine Learning for Cyber Security - 5th International Conference, ML4CS","author":"Collingwood Pyke Mads Solberg","year":"2023","unstructured":"Mads Solberg Collingwood Pyke, Weizhi Meng, and Brooke Lampe. 2023. Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering. In Machine Learning for Cyber Security - 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4--6, 2023, Proceedings (Lecture Notes in Computer Science), Dan Dongseong Kim and Chao Chen (Eds.), Vol. 14541. Springer, 145--162."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155449"},{"key":"e_1_3_2_1_28_1","volume-title":"SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020","author":"Yan Qiben","year":"2020","unstructured":"Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, and Ning Zhang. 2020. SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23--26, 2020. The Internet Society."}],"event":{"name":"ACM SIGCOMM Posters and Demos '24: ACM SIGCOMM 2024 Conference: Posters and Demos","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Sydney NSW Australia","acronym":"ACM SIGCOMM Posters and Demos '24"},"container-title":["Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3672202.3673730","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3672202.3673730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:48Z","timestamp":1750294668000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3672202.3673730"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,4]]},"references-count":28,"alternative-id":["10.1145\/3672202.3673730","10.1145\/3672202"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/3672202.3673730","relation":{},"subject":[],"published":{"date-parts":[[2024,8,4]]},"assertion":[{"value":"2024-08-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}