{"id":"https://openalex.org/W2534878473","doi":"https://doi.org/10.1145/2976749.2978328","title":"The Sounds of the Phones","display_name":"The Sounds of the Phones","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2534878473","doi":"https://doi.org/10.1145/2976749.2978328","mag":"2534878473"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978328","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978328","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2978328&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2978328&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054639396","display_name":"Babins Shrestha","orcid":"https://orcid.org/0000-0002-1579-2325"},"institutions":[{"id":"https://openalex.org/I32389192","display_name":"University of Alabama at Birmingham","ror":"https://ror.org/008s83205","country_code":"US","type":"education","lineage":["https://openalex.org/I32389192"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Babins Shrestha","raw_affiliation_strings":["University of Alabama at Birmingham, Birmingham, AL, USA"],"affiliations":[{"raw_affiliation_string":"University of Alabama at Birmingham, Birmingham, AL, USA","institution_ids":["https://openalex.org/I32389192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045531459","display_name":"Maliheh Shirvanian","orcid":"https://orcid.org/0000-0001-9735-3723"},"institutions":[{"id":"https://openalex.org/I32389192","display_name":"University of Alabama at Birmingham","ror":"https://ror.org/008s83205","country_code":"US","type":"education","lineage":["https://openalex.org/I32389192"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maliheh Shirvanian","raw_affiliation_strings":["University of Alabama at Birmingham, Birmingham, USA"],"affiliations":[{"raw_affiliation_string":"University of Alabama at Birmingham, Birmingham, USA","institution_ids":["https://openalex.org/I32389192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017417273","display_name":"Prakash Shrestha","orcid":"https://orcid.org/0000-0002-7779-6399"},"institutions":[{"id":"https://openalex.org/I32389192","display_name":"University of Alabama at Birmingham","ror":"https://ror.org/008s83205","country_code":"US","type":"education","lineage":["https://openalex.org/I32389192"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prakash Shrestha","raw_affiliation_strings":["University of Alabama at Birmingham, Birmingham, AL, USA"],"affiliations":[{"raw_affiliation_string":"University of Alabama at Birmingham, Birmingham, AL, USA","institution_ids":["https://openalex.org/I32389192"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059730489","display_name":"Nitesh Saxena","orcid":"https://orcid.org/0000-0001-6083-104X"},"institutions":[{"id":"https://openalex.org/I32389192","display_name":"University of Alabama at Birmingham","ror":"https://ror.org/008s83205","country_code":"US","type":"education","lineage":["https://openalex.org/I32389192"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nitesh Saxena","raw_affiliation_strings":["University of Alabama at Birmingham, Birmingham, AL, USA"],"affiliations":[{"raw_affiliation_string":"University of Alabama at Birmingham, Birmingham, AL, USA","institution_ids":["https://openalex.org/I32389192"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5054639396"],"corresponding_institution_ids":["https://openalex.org/I32389192"],"apc_list":null,"apc_paid":null,"fwci":4.0732,"has_fulltext":true,"cited_by_count":52,"citation_normalized_percentile":{"value":0.94757168,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"908","last_page":"919"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7462480664253235},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.7267488241195679},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.7174356579780579},{"id":"https://openalex.org/keywords/alarm","display_name":"ALARM","score":0.6841249465942383},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6690808534622192},{"id":"https://openalex.org/keywords/sound","display_name":"Sound (geography)","score":0.557479739189148},{"id":"https://openalex.org/keywords/proof-of-concept","display_name":"Proof of concept","score":0.5411270260810852},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5296962857246399},{"id":"https://openalex.org/keywords/marketing-buzz","display_name":"Marketing buzz","score":0.5199317336082458},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.4449743330478668},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.41789913177490234},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3204920291900635},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17205902934074402},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1470194160938263},{"id":"https://openalex.org/keywords/acoustics","display_name":"Acoustics","score":0.11565050482749939}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7462480664253235},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.7267488241195679},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.7174356579780579},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.6841249465942383},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6690808534622192},{"id":"https://openalex.org/C203718221","wikidata":"https://www.wikidata.org/wiki/Q491713","display_name":"Sound (geography)","level":2,"score":0.557479739189148},{"id":"https://openalex.org/C124978682","wikidata":"https://www.wikidata.org/wiki/Q1201019","display_name":"Proof of concept","level":2,"score":0.5411270260810852},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5296962857246399},{"id":"https://openalex.org/C113993141","wikidata":"https://www.wikidata.org/wiki/Q906759","display_name":"Marketing buzz","level":2,"score":0.5199317336082458},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.4449743330478668},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.41789913177490234},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3204920291900635},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17205902934074402},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1470194160938263},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.11565050482749939},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978328","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978328","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2978328&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2976749.2978328","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978328","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2978328&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.7900000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1045004693","display_name":null,"funder_award_id":"CNS-1526524,CNS-1547350","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4064920815","display_name":null,"funder_award_id":"1547350","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G434073065","display_name":"TWC: Small: Collaborative: Spoof-Resistant Smartphone Authentication using Cooperating Wearables","funder_award_id":"1526524","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6194832830","display_name":null,"funder_award_id":"CNS-1526524","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6507447573","display_name":null,"funder_award_id":"several","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2534878473.pdf","grobid_xml":"https://content.openalex.org/works/W2534878473.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W32836451","https://openalex.org/W1550000763","https://openalex.org/W1955134710","https://openalex.org/W1989085188","https://openalex.org/W1990556702","https://openalex.org/W2022423863","https://openalex.org/W2087355434","https://openalex.org/W2114275288","https://openalex.org/W2350778671"],"related_works":["https://openalex.org/W2116740649","https://openalex.org/W2099040923","https://openalex.org/W4387941994","https://openalex.org/W4237474497","https://openalex.org/W2808610987","https://openalex.org/W1985865137","https://openalex.org/W2068569233","https://openalex.org/W2807898447","https://openalex.org/W2384816865","https://openalex.org/W2146270836"],"abstract_inverted_index":{"Reducing":[0],"user":[1],"burden":[2],"underlying":[3],"traditional":[4],"two-factor":[5],"authentication":[6],"constitutes":[7],"an":[8],"important":[9],"research":[10],"effort.":[11],"An":[12],"interesting":[13],"representative":[14],"approach,":[15],"Sound-Proof,":[16],"leverages":[17],"ambient":[18,75],"sounds":[19,76,100,144],"to":[20,38,72,94,138,148],"detect":[21],"the":[22,25,31,62,66,74,78,83,121,129,136,142,146,153],"proximity":[23],"between":[24],"second":[26],"factor":[27],"device":[28],"(phone)":[29],"and":[30,44,47,140],"login":[32,149],"terminal":[33],"(browser).":[34],"Sound-Proof":[35,63,84],"was":[36],"shown":[37],"be":[39],"secure":[40],"against":[41],"remote":[42,67],"attackers":[43],"highly":[45],"usable,":[46],"is":[48],"now":[49],"under":[50,159],"early":[51],"deployment":[52],"phases.":[53],"In":[54],"this":[55,108],"paper,":[56,85],"we":[57,110],"identify":[58],"a":[59,113],"weakness":[60],"of":[61,123,152],"system,":[64],"namely,":[65],"attacker":[68],"does":[69],"not":[70],"have":[71],"predict":[73],"near":[77],"phone":[79,93,137],"as":[80],"assumed":[81],"in":[82],"but":[86],"rather":[87],"can":[88,118],"deliberately":[89],"make-or":[90],"wait":[91],"for-the":[92],"produce":[95],"predictable":[96],"or":[97,104,133],"previously":[98],"known":[99],"(e.g.,":[101],"ringer,":[102],"notification":[103],"alarm":[105],"sounds).":[106],"Exploiting":[107],"weakness,":[109],"build":[111],"Sound-Danger,":[112],"full":[114],"attack":[115,126,156],"system":[116],"that":[117],"successfully":[119],"compromise":[120],"security":[122],"Sound-Proof.":[124],"The":[125,155],"involves":[127],"buzzing":[128],"victim":[130],"user's":[131],"phone,":[132],"waiting":[134],"for":[135],"buzz,":[139],"feeding":[141],"corresponding":[143],"at":[145],"browser":[147],"on":[150],"behalf":[151],"user.":[154],"works":[157],"precisely":[158],"Sound-Proof's":[160],"threat":[161],"model.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
