{"id":"https://openalex.org/W2963901295","doi":"https://doi.org/10.1007/s10207-019-00449-8","title":"SonarSnoop: active acoustic side-channel attacks","display_name":"SonarSnoop: active acoustic side-channel attacks","publication_year":2019,"publication_date":"2019-07-05","ids":{"openalex":"https://openalex.org/W2963901295","doi":"https://doi.org/10.1007/s10207-019-00449-8","mag":"2963901295"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-019-00449-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-019-00449-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-019-00449-8.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-019-00449-8.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111090174","display_name":"Peng Cheng","orcid":"https://orcid.org/0000-0002-4453-2274"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Peng Cheng","raw_affiliation_strings":["Lancaster University, Lancaster, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Lancaster University, Lancaster, United Kingdom","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090600631","display_name":"\u0130brahim Ethem Ba\u011fc\u0131","orcid":"https://orcid.org/0000-0001-8397-9661"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ibrahim Ethem Bagci","raw_affiliation_strings":["Lancaster University, Lancaster, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Lancaster University, Lancaster, United Kingdom","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036442254","display_name":"Utz Roedig","orcid":"https://orcid.org/0000-0002-4020-0889"},"institutions":[{"id":"https://openalex.org/I27577105","display_name":"University College Cork","ror":"https://ror.org/03265fv13","country_code":"IE","type":"education","lineage":["https://openalex.org/I27577105"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Utz Roedig","raw_affiliation_strings":["University College Cork, Cork, Ireland"],"affiliations":[{"raw_affiliation_string":"University College Cork, Cork, Ireland","institution_ids":["https://openalex.org/I27577105"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100864308","display_name":"Jeff Yan","orcid":"https://orcid.org/0009-0002-0659-6776"},"institutions":[{"id":"https://openalex.org/I102134673","display_name":"Link\u00f6ping University","ror":"https://ror.org/05ynxx418","country_code":"SE","type":"education","lineage":["https://openalex.org/I102134673"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Jeff Yan","raw_affiliation_strings":["Link\u00f6ping University, Link\u00f6ping, Sweden"],"affiliations":[{"raw_affiliation_string":"Link\u00f6ping University, Link\u00f6ping, Sweden","institution_ids":["https://openalex.org/I102134673"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100864308"],"corresponding_institution_ids":["https://openalex.org/I102134673"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":3.8389,"has_fulltext":true,"cited_by_count":38,"citation_normalized_percentile":{"value":0.94468111,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"19","issue":"2","first_page":"213","last_page":"228"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8066979646682739},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7630589604377747},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6228184700012207},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.5020322799682617},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.47114506363868713},{"id":"https://openalex.org/keywords/echo","display_name":"Echo (communications protocol)","score":0.4695618450641632},{"id":"https://openalex.org/keywords/marine-mammals-and-sonar","display_name":"Marine mammals and sonar","score":0.4443187117576599},{"id":"https://openalex.org/keywords/acoustics","display_name":"Acoustics","score":0.405417263507843},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39896246790885925},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.37058568000793457},{"id":"https://openalex.org/keywords/sonar","display_name":"Sonar","score":0.31751078367233276},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.29426491260528564},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12341231107711792}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8066979646682739},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7630589604377747},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6228184700012207},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.5020322799682617},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.47114506363868713},{"id":"https://openalex.org/C2779426996","wikidata":"https://www.wikidata.org/wiki/Q18389128","display_name":"Echo (communications protocol)","level":2,"score":0.4695618450641632},{"id":"https://openalex.org/C137184094","wikidata":"https://www.wikidata.org/wiki/Q6764300","display_name":"Marine mammals and sonar","level":3,"score":0.4443187117576599},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.405417263507843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39896246790885925},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.37058568000793457},{"id":"https://openalex.org/C555745239","wikidata":"https://www.wikidata.org/wiki/Q133220","display_name":"Sonar","level":2,"score":0.31751078367233276},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.29426491260528564},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12341231107711792},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10207-019-00449-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-019-00449-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-019-00449-8.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:cora.ucc.ie:10468/8524","is_oa":true,"landing_page_url":"http://hdl.handle.net/10468/8524","pdf_url":null,"source":{"id":"https://openalex.org/S4306400766","display_name":"Cork Open Research Archive (University College Cork)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I27577105","host_organization_name":"University College Cork","host_organization_lineage":["https://openalex.org/I27577105"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/s10207-019-00449-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-019-00449-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-019-00449-8.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G8683756101","display_name":null,"funder_award_id":"support","funder_id":"https://openalex.org/F4320322327","funder_display_name":"Knut och Alice Wallenbergs Stiftelse"}],"funders":[{"id":"https://openalex.org/F4320320273","display_name":"University of Cambridge","ror":"https://ror.org/013meh722"},{"id":"https://openalex.org/F4320322327","display_name":"Knut och Alice Wallenbergs Stiftelse","ror":"https://ror.org/004hzzk67"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2963901295.pdf","grobid_xml":"https://content.openalex.org/works/W2963901295.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W192266324","https://openalex.org/W1499486838","https://openalex.org/W1626992774","https://openalex.org/W1824405704","https://openalex.org/W1971497680","https://openalex.org/W1973132608","https://openalex.org/W1973831058","https://openalex.org/W2013735525","https://openalex.org/W2033811191","https://openalex.org/W2044798763","https://openalex.org/W2080335657","https://openalex.org/W2107816859","https://openalex.org/W2115042198","https://openalex.org/W2128025167","https://openalex.org/W2131522727","https://openalex.org/W2141336889","https://openalex.org/W2147124620","https://openalex.org/W2150639461","https://openalex.org/W2217110094","https://openalex.org/W2394945029","https://openalex.org/W2399891510","https://openalex.org/W2403211866","https://openalex.org/W2403657431","https://openalex.org/W2525572646","https://openalex.org/W2525860450","https://openalex.org/W2534681634","https://openalex.org/W2611887307","https://openalex.org/W2613395272","https://openalex.org/W2624323089","https://openalex.org/W2625581252","https://openalex.org/W2684055372","https://openalex.org/W2756172860","https://openalex.org/W2775585208","https://openalex.org/W2963901295","https://openalex.org/W3100675173"],"related_works":["https://openalex.org/W2093349293","https://openalex.org/W1587231772","https://openalex.org/W1988296569","https://openalex.org/W3080799800","https://openalex.org/W1985715627","https://openalex.org/W165019947","https://openalex.org/W99666048","https://openalex.org/W2009091175","https://openalex.org/W2071570587","https://openalex.org/W2050605878"],"abstract_inverted_index":{"We":[0],"report":[1],"the":[2,18,25,47,67],"first":[3],"active":[4],"acoustic":[5,15,26,96],"side-channel":[6],"attack.":[7],"Speakers":[8],"are":[9],"used":[10,41],"to":[11,42,58,78,81,91,103,111],"emit":[12],"human":[13],"inaudible":[14],"signals,":[16],"and":[17,115],"echo":[19,37],"is":[20,100],"recorded":[21],"via":[22],"microphones,":[23],"turning":[24],"system":[27],"of":[28,69,125],"a":[29,33,51,82,122],"smart":[30],"phone":[31,85],"into":[32],"sonar":[34],"system.":[35],"The":[36,98],"signal":[38],"can":[39,55,86,107],"be":[40,56,87,108],"profile":[43],"user":[44],"interaction":[45],"with":[46],"device.":[48],"For":[49],"example,":[50],"victim\u2019s":[52],"finger":[53],"movements":[54],"inferred":[57],"steal":[59],"Android":[60],"unlock":[61,71],"patterns.":[62],"In":[63],"our":[64,119],"empirical":[65],"study,":[66],"number":[68],"candidate":[70],"patterns":[72],"that":[73],"an":[74],"attacker":[75],"must":[76],"try":[77],"authenticate":[79],"herself":[80],"Samsung":[83],"S4":[84],"reduced":[88],"by":[89],"up":[90],"70%":[92],"using":[93],"this":[94],"novel":[95],"side-channel.":[97],"attack":[99],"entirely":[101],"unnoticeable":[102],"victims.":[104],"Our":[105],"approach":[106],"easily":[109],"applied":[110],"other":[112],"application":[113],"scenarios":[114],"device":[116],"types.":[117],"Overall,":[118],"work":[120],"highlights":[121],"new":[123],"family":[124],"security":[126],"threats.":[127]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":6}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
