{"id":"https://openalex.org/W7128694373","doi":"https://doi.org/10.1109/access.2026.3664214","title":"Engineering Sensor Spoofing Protection Into the Android Operating System","display_name":"Engineering Sensor Spoofing Protection Into the Android Operating System","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7128694373","doi":"https://doi.org/10.1109/access.2026.3664214"},"language":null,"primary_location":{"id":"doi:10.1109/access.2026.3664214","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3664214","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3664214","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054941057","display_name":"Roy Hershkovitz","orcid":null},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Roy Hershkovitz","raw_affiliation_strings":["Stein Faculty of Computer and Information Science, Ben-Gurion University of the Negev, Be&#x2019;er Sheba, Israel"],"affiliations":[{"raw_affiliation_string":"Stein Faculty of Computer and Information Science, Ben-Gurion University of the Negev, Be&#x2019;er Sheba, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105424651","display_name":"Yossi Oren","orcid":"https://orcid.org/0009-0001-3658-6950"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yossi Oren","raw_affiliation_strings":["Stein Faculty of Computer and Information Science, Ben-Gurion University of the Negev, Be&#x2019;er Sheba, Israel"],"affiliations":[{"raw_affiliation_string":"Stein Faculty of Computer and Information Science, Ben-Gurion University of the Negev, Be&#x2019;er Sheba, Israel","institution_ids":["https://openalex.org/I124227911"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5054941057"],"corresponding_institution_ids":["https://openalex.org/I124227911"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.42321257,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"26899","last_page":"26911"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.5016999840736389,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.5016999840736389,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.28029999136924744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.040699999779462814,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8177000284194946},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.49900001287460327},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.45179998874664307},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4034999907016754},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.39410001039505005},{"id":"https://openalex.org/keywords/embedded-operating-system","display_name":"Embedded operating system","score":0.37929999828338623}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8177000284194946},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7534000277519226},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5856999754905701},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.49900001287460327},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.45179998874664307},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.41119998693466187},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4034999907016754},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.39410001039505005},{"id":"https://openalex.org/C35939892","wikidata":"https://www.wikidata.org/wiki/Q1139923","display_name":"Embedded operating system","level":3,"score":0.37929999828338623},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3580000102519989},{"id":"https://openalex.org/C176563091","wikidata":"https://www.wikidata.org/wiki/Q669238","display_name":"Intelligent sensor","level":3,"score":0.328900009393692},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2994999885559082},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2856999933719635},{"id":"https://openalex.org/C200593801","wikidata":"https://www.wikidata.org/wiki/Q7451089","display_name":"Sensor web","level":5,"score":0.27810001373291016},{"id":"https://openalex.org/C2778648169","wikidata":"https://www.wikidata.org/wiki/Q967768","display_name":"Compatibility (geochemistry)","level":2,"score":0.26440000534057617},{"id":"https://openalex.org/C26771161","wikidata":"https://www.wikidata.org/wiki/Q16980","display_name":"ARM architecture","level":2,"score":0.26260000467300415}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2026.3664214","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3664214","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3664214","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3664214","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2127979711","https://openalex.org/W2135535527","https://openalex.org/W2150847526","https://openalex.org/W2207856858","https://openalex.org/W2314386516","https://openalex.org/W2320883753","https://openalex.org/W2476401816","https://openalex.org/W2725499676","https://openalex.org/W2891928976","https://openalex.org/W2952117282","https://openalex.org/W2963197901","https://openalex.org/W3080825594","https://openalex.org/W4225289891","https://openalex.org/W4288057756","https://openalex.org/W4295289303","https://openalex.org/W4317927981","https://openalex.org/W4386783356","https://openalex.org/W4404630794","https://openalex.org/W4413578367"],"related_works":[],"abstract_inverted_index":{"Sensor":[0],"spoofing":[1,40,71,135],"attacks":[2,41,136],"are":[3],"a":[4,94,119],"serious":[5],"threat":[6],"to":[7,16,50,82,130],"mobile":[8],"phones,":[9],"as":[10],"they":[11],"can":[12],"manipulate":[13],"sensor":[14,39,70,102,134],"readings":[15],"subvert":[17],"the":[18,51,63,74,83,101,106,158,165],"behavior":[19],"of":[20,100,110,121],"applications":[21,52],"that":[22,68,126,147],"rely":[23],"on":[24,93,118,154,164],"these":[25,46],"readings.":[26,103],"Previous":[27],"work":[28],"has":[29],"shown":[30],"how":[31],"machine":[32,159],"learning":[33,160],"defenses":[34,47],"provide":[35],"effective":[36],"protection":[37,72],"against":[38],"without":[42,78],"hardware":[43],"modification.":[44],"Unfortunately,":[45],"require":[48],"changes":[49],"themselves.":[53],"In":[54],"this":[55],"paper,":[56],"we":[57],"present":[58],"SDIOS":[59,88,127],"(Sensor":[60],"Defense":[61],"in":[62,137],"Operating":[64],"System),":[65],"an":[66,90],"approach":[67],"engineers":[69],"into":[73],"operating":[75],"system":[76],"level,":[77],"requiring":[79],"any":[80],"modifications":[81],"applications.":[84],"At":[85],"its":[86,114,148],"core,":[87],"incorporates":[89],"autoencoder":[91],"based":[92],"Gramian":[95],"Angular":[96],"Field":[97],"(GAF)":[98],"representation":[99],"We":[104],"describe":[105],"design":[107],"and":[108,112,116,132],"implementation":[109],"SDIOS,":[111],"evaluate":[113],"performance":[115,149],"compatibility":[117,142],"variety":[120],"devices.":[122],"Our":[123],"results":[124],"show":[125],"is":[128,151,162],"able":[129],"detect":[131],"prevent":[133],"real":[138],"time,":[139],"while":[140],"retaining":[141],"with":[143],"existing":[144],"applications,":[145],"but":[146],"impact":[150],"significant,":[152],"especially":[153],"resource-constrained":[155],"devices":[156],"where":[157],"pipeline":[161],"run":[163],"central":[166],"processing":[167],"unit":[168],"(CPU).":[169]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-02-13T00:00:00"}
