{"id":"https://openalex.org/W2765889578","doi":"https://doi.org/10.1145/3133956.3138831","title":"POSTER","display_name":"POSTER","publication_year":2017,"publication_date":"2017-10-27","ids":{"openalex":"https://openalex.org/W2765889578","doi":"https://doi.org/10.1145/3133956.3138831","mag":"2765889578"},"language":"en","primary_location":{"id":"doi:10.1145/3133956.3138831","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3138831","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100449462","display_name":"Young-Joo Lee","orcid":"https://orcid.org/0000-0002-7290-8785"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Youngjoo Lee","raw_affiliation_strings":["Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103011188","display_name":"Wonseok Yang","orcid":"https://orcid.org/0009-0006-0672-6322"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"WonSeok Yang","raw_affiliation_strings":["Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090551692","display_name":"Taekyoung Kwon","orcid":"https://orcid.org/0000-0002-5513-0836"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Taekyoung Kwon","raw_affiliation_strings":["Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100449462"],"corresponding_institution_ids":["https://openalex.org/I193775966"],"apc_list":null,"apc_paid":null,"fwci":0.3698,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.58704202,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"2527","last_page":"2529"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/smartwatch","display_name":"Smartwatch","score":0.7552608251571655},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6833333969116211},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.6742446422576904},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6650044322013855},{"id":"https://openalex.org/keywords/smart-device","display_name":"Smart device","score":0.5826626420021057},{"id":"https://openalex.org/keywords/wearable-technology","display_name":"Wearable technology","score":0.5747954845428467},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.46918821334838867},{"id":"https://openalex.org/keywords/smart-phone","display_name":"Smart phone","score":0.46481001377105713},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.46001362800598145},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4314267635345459},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3855133652687073},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.16786909103393555},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11936721205711365},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09786039590835571}],"concepts":[{"id":"https://openalex.org/C29794715","wikidata":"https://www.wikidata.org/wiki/Q5362345","display_name":"Smartwatch","level":3,"score":0.7552608251571655},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6833333969116211},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.6742446422576904},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6650044322013855},{"id":"https://openalex.org/C2776898695","wikidata":"https://www.wikidata.org/wiki/Q11253473","display_name":"Smart device","level":2,"score":0.5826626420021057},{"id":"https://openalex.org/C54290928","wikidata":"https://www.wikidata.org/wiki/Q4845080","display_name":"Wearable technology","level":3,"score":0.5747954845428467},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.46918821334838867},{"id":"https://openalex.org/C2984771860","wikidata":"https://www.wikidata.org/wiki/Q22645","display_name":"Smart phone","level":2,"score":0.46481001377105713},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.46001362800598145},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4314267635345459},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3855133652687073},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.16786909103393555},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11936721205711365},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09786039590835571},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3133956.3138831","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3138831","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7186942592","display_name":null,"funder_award_id":"NRF-2015R1A2A2A01004792","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1917391056","https://openalex.org/W2411277911","https://openalex.org/W2905514290"],"related_works":["https://openalex.org/W2790190351","https://openalex.org/W2007382769","https://openalex.org/W2756171776","https://openalex.org/W2612437796","https://openalex.org/W2752045057","https://openalex.org/W2977705381","https://openalex.org/W2971637278","https://openalex.org/W4397002167","https://openalex.org/W2009837250","https://openalex.org/W2331903188"],"abstract_inverted_index":{"We":[0,93],"coin":[1],"a":[2,9,12,17,35,45,88,118,136],"new":[3],"term":[4],"called":[5],"\\textit{data":[6],"transfusion}":[7],"as":[8,109],"phenomenon":[10,89],"that":[11,69,135,156,195],"user":[13,149],"experiences":[14],"when":[15,181],"pairing":[16,50],"wearable":[18,42,53],"device":[19,33,43,54],"with":[20,122],"the":[21,31,41,52,60,175,185],"host":[22,32],"device.":[23],"A":[24],"large":[25,137],"amount":[26,138],"of":[27,62,102,139],"data":[28,73,103,141],"stored":[29],"in":[30,110,127],"(e.g.,":[34,44],"smartphone)":[36],"is":[37,55,65,74],"forcibly":[38],"copied":[39],"to":[40,49,173],"smart":[46,91,124,162],"watch)":[47],"due":[48],"while":[51],"usually":[56],"less":[57],"attended.":[58],"To":[59],"best":[61],"knowledge,":[63],"there":[64,145],"no":[66],"previous":[67],"work":[68],"manipulates":[70],"how":[71,81],"sensitive":[72,140],"transfused":[75],"even":[76],"without":[77],"user's":[78],"consent":[79],"and":[80,84,114,117,166,191],"users":[82,157],"perceive":[83],"behave":[85],"regarding":[86],"such":[87,108],"for":[90,164],"watches.":[92],"tackle":[94],"this":[95],"problem":[96],"by":[97],"conducting":[98],"an":[99],"experimental":[100,131],"study":[101,121],"extraction":[104],"from":[105],"commodity":[106],"devices,":[107],"Android":[111],"Wear,":[112],"watchOS,":[113],"Tizen":[115],"platforms,":[116],"following":[119],"survey":[120,152],"205":[123],"watch":[125],"users,":[126],"two":[128],"folds.":[129],"The":[130,151],"studies":[132],"have":[133,154,158],"shown":[134,155],"was":[142,146],"transfused,":[143],"but":[144,170],"not":[147],"enough":[148],"notification.":[150],"results":[153],"lower":[159],"perception":[160],"on":[161,178,184],"watches":[163],"security":[165],"privacy":[167],"than":[168],"smartphones,":[169],"they":[171],"tend":[172],"set":[174],"same":[176],"passcode":[177],"both":[179],"devices":[180],"needed.":[182],"Based":[183],"results,":[186],"we":[187],"perform":[188],"risk":[189],"assessment":[190],"discuss":[192],"possible":[193],"mitigation":[194],"involves":[196],"volatile":[197],"transfusion.":[198]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2017-11-10T00:00:00"}
