{"id":"https://openalex.org/W2765620065","doi":"https://doi.org/10.1145/3133956.3138832","title":"POSTER","display_name":"POSTER","publication_year":2017,"publication_date":"2017-10-27","ids":{"openalex":"https://openalex.org/W2765620065","doi":"https://doi.org/10.1145/3133956.3138832","mag":"2765620065"},"language":"en","primary_location":{"id":"doi:10.1145/3133956.3138832","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3138832","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100730151","display_name":"Seung\u2010Yeon Kim","orcid":"https://orcid.org/0000-0002-4006-6667"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Seungyeon Kim","raw_affiliation_strings":["Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040581340","display_name":"Hoyeon Lee","orcid":"https://orcid.org/0000-0002-1165-1509"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hoyeon Lee","raw_affiliation_strings":["Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076713179","display_name":"Taekyoung Kwon","orcid":"https://orcid.org/0000-0002-7795-0077"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Taekyoung Kwon","raw_affiliation_strings":["Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100730151"],"corresponding_institution_ids":["https://openalex.org/I193775966"],"apc_list":null,"apc_paid":null,"fwci":0.9673,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83173323,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"9","issue":null,"first_page":"2515","last_page":"2517"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12553","display_name":"Psychedelics and Drug Studies","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11818","display_name":"Nicotinic Acetylcholine Receptors Study","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5695171356201172}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5695171356201172}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3133956.3138832","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3138832","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7186942592","display_name":null,"funder_award_id":"NRF-2015R1A2A2A01004792","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1626992774","https://openalex.org/W2490246215","https://openalex.org/W2561381909","https://openalex.org/W2772111263"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Modern":[0],"smartphones":[1,136],"popularly":[2],"adopt":[3],"a":[4,12,18,23,29,42,46,61,118,122,186],"small":[5,69],"touch":[6,70,129],"sensor":[7,130],"for":[8,68,169],"fingerprint":[9,48,63,197],"identification":[10],"of":[11,22,37,94,131,171],"user,":[13],"but":[14,105],"it":[15,178],"captures":[16],"only":[17],"partial":[19],"limited":[20],"portion":[21],"fingerprint.":[24],"Recently":[25],"we":[26,75,86,96,148,184],"have":[27,87,90,149],"studied":[28],"gap":[30],"between":[31],"actual":[32,56,181],"risk":[33],"and":[34,44,112,142,156,199],"user":[35,187,192],"perception":[36,193],"latent":[38,53],"fingerprints":[39,54],"remaining":[40,161],"on":[41,82,159,194],"smartphone,":[43],"developed":[45],"fake":[47,62,115,196],"attack":[49,101],"that":[50,85,98],"exploits":[51],"the":[52,83,99,109,128,160,195,200],"as":[55],"risk.":[57,182],"We":[58,107,163],"successfully":[59],"reconstructed":[60,110],"image":[64,111],"in":[65,151],"good":[66],"quality":[67],"sensors.":[71],"In":[72],"this":[73],"paper,":[74],"subsequently":[76],"conduct":[77,165],"post":[78],"hoc":[79],"experimental":[80,167],"studies":[81],"facts":[84],"missed":[88],"or":[89,121],"since":[91],"learned.":[92],"First":[93],"all,":[95],"examine":[97],"presented":[100],"is":[102],"not":[103],"conceptual":[104],"realistic.":[106],"employ":[108],"make":[113],"its":[114],"fingerprint,":[116],"using":[117],"conductive":[119],"printing":[120],"silicon-like":[123],"glue,":[124],"to":[125,175,190],"pass":[126],"directly":[127],"real":[132],"smartphones.":[133,162],"Our":[134],"target":[135],"are":[137],"Samsung":[138],"Galaxy":[139,153],"S6,":[140,154],"S7":[141],"iPhone":[143],"5s,":[144],"6,":[145],"7.":[146],"Indeed":[147],"succeeded":[150],"passing":[152],"S7,":[155],"now":[157],"work":[158],"also":[164],"an":[166],"study":[168,189],"one":[170],"our":[172],"mitigation":[173,201],"methods":[174],"see":[176],"how":[177],"can":[179],"reduce":[180],"Finally,":[183],"perform":[185],"survey":[188],"understand":[191],"attacks":[198],"methods.":[202]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2017-11-10T00:00:00"}
