{"id":"https://openalex.org/W2891504192","doi":"https://doi.org/10.1145/3243734.3243755","title":"No Training Hurdles","display_name":"No Training Hurdles","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2891504192","doi":"https://doi.org/10.1145/3243734.3243755","mag":"2891504192"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3243755","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243755","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243755","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243755","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091078914","display_name":"Song Fang","orcid":"https://orcid.org/0000-0002-2354-3310"},"institutions":[{"id":"https://openalex.org/I8692664","display_name":"University of Oklahoma","ror":"https://ror.org/02aqsxs83","country_code":"US","type":"education","lineage":["https://openalex.org/I8692664"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Song Fang","raw_affiliation_strings":["University of Oklahoma, Norman, OK, USA"],"affiliations":[{"raw_affiliation_string":"University of Oklahoma, Norman, OK, USA","institution_ids":["https://openalex.org/I8692664"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056181645","display_name":"Ian Markwood","orcid":"https://orcid.org/0000-0003-2168-2445"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ian Markwood","raw_affiliation_strings":["University of South Florida, Tampa, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of South Florida, Tampa, FL, USA","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100463098","display_name":"Yao Liu","orcid":"https://orcid.org/0000-0003-3382-798X"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yao Liu","raw_affiliation_strings":["University of South Florida, Tampa, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of South Florida, Tampa, FL, USA","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057883383","display_name":"Shangqing Zhao","orcid":"https://orcid.org/0000-0001-8543-2977"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shangqing Zhao","raw_affiliation_strings":["University of South Florida, Tampa, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of South Florida, Tampa, FL, USA","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019612445","display_name":"Zhuo Lu","orcid":"https://orcid.org/0000-0003-1131-4307"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhuo Lu","raw_affiliation_strings":["University of South Florida, Tampa, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of South Florida, Tampa, FL, USA","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039106671","display_name":"Haojin Zhu","orcid":"https://orcid.org/0000-0001-5079-4556"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haojin Zhu","raw_affiliation_strings":["Shanghai Jiaotong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5091078914"],"corresponding_institution_ids":["https://openalex.org/I8692664"],"apc_list":null,"apc_paid":null,"fwci":4.5124,"has_fulltext":true,"cited_by_count":35,"citation_normalized_percentile":{"value":0.95352226,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1747","last_page":"1760"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8550485372543335},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.7758233547210693},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6576524376869202},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6571059823036194},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.6350206136703491},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5872703790664673},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5821892619132996},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5648273825645447},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.48793432116508484},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47536152601242065},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21651974320411682},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09263572096824646}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8550485372543335},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.7758233547210693},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6576524376869202},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6571059823036194},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.6350206136703491},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5872703790664673},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5821892619132996},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5648273825645447},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.48793432116508484},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47536152601242065},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21651974320411682},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09263572096824646},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3243734.3243755","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243755","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243755","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3243734.3243755","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243755","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243755","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.75,"display_name":"Life in Land","id":"https://metadata.un.org/sdg/15"}],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1556335997","display_name":null,"funder_award_id":"61672350","funder_id":"https://openalex.org/F4320335595","funder_display_name":"National Natural Science Foundation of China-Yunnan Joint Fund"},{"id":"https://openalex.org/G3220748246","display_name":null,"funder_award_id":"1527144","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G481975180","display_name":null,"funder_award_id":"1553304","funder_id":"https://openalex.org/F4320310847","funder_display_name":"University of South Florida"},{"id":"https://openalex.org/G5118938759","display_name":null,"funder_award_id":"1553304","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6072579332","display_name":null,"funder_award_id":"1717969","funder_id":"https://openalex.org/F4320310847","funder_display_name":"University of South Florida"},{"id":"https://openalex.org/G8178941013","display_name":null,"funder_award_id":"1527144, 1553304, 1717969","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8536293663","display_name":null,"funder_award_id":"61672350","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8628560409","display_name":null,"funder_award_id":"CNS-1527144","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320310847","display_name":"University of South Florida","ror":"https://ror.org/032db5x82"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335595","display_name":"National Natural Science Foundation of China-Yunnan Joint Fund","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2891504192.pdf","grobid_xml":"https://content.openalex.org/works/W2891504192.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W595252221","https://openalex.org/W1504156292","https://openalex.org/W1555148682","https://openalex.org/W1892798954","https://openalex.org/W1966672755","https://openalex.org/W2004333922","https://openalex.org/W2007382769","https://openalex.org/W2010882865","https://openalex.org/W2016549506","https://openalex.org/W2046128267","https://openalex.org/W2055344768","https://openalex.org/W2074367177","https://openalex.org/W2080335657","https://openalex.org/W2082437395","https://openalex.org/W2082629283","https://openalex.org/W2115042198","https://openalex.org/W2117909688","https://openalex.org/W2119028650","https://openalex.org/W2124885613","https://openalex.org/W2128025167","https://openalex.org/W2129045955","https://openalex.org/W2131877534","https://openalex.org/W2141336889","https://openalex.org/W2142285879","https://openalex.org/W2144994235","https://openalex.org/W2149359921","https://openalex.org/W2150639461","https://openalex.org/W2158090937","https://openalex.org/W2162003954","https://openalex.org/W2294170611","https://openalex.org/W2525572646","https://openalex.org/W2534482106","https://openalex.org/W2542963527","https://openalex.org/W2579193977","https://openalex.org/W2610335499","https://openalex.org/W2997437965","https://openalex.org/W4231807801"],"related_works":["https://openalex.org/W2368710903","https://openalex.org/W4386360526","https://openalex.org/W2772112465","https://openalex.org/W4387918499","https://openalex.org/W2158905603","https://openalex.org/W112420819","https://openalex.org/W2918039754","https://openalex.org/W2889153935","https://openalex.org/W2982666975","https://openalex.org/W2980498517"],"abstract_inverted_index":{"Traditional":[0],"methods":[1],"to":[2,13,44,76,90,126,193,209,229,233],"eavesdrop":[3,32,151],"keystrokes":[4,16,34],"leverage":[5],"some":[6],"malware":[7],"installed":[8],"in":[9,35],"a":[10,25,36,46,54,57,61,84,104,155,189],"target":[11,42],"computer":[12,43],"record":[14],"the":[15,33,41,74,78,92,100,110,133,142,168,195,222,235],"for":[17,213],"an":[18,95],"adversary.":[19],"Existing":[20],"research":[21],"work":[22,218,242],"has":[23],"identified":[24],"new":[26,231],"class":[27],"of":[28,56,102,114,176,191,197,225],"attacks":[29,130],"that":[30,52,122,203],"can":[31,59,68,239],"non-invasive":[37],"way":[38],"without":[39,131],"infecting":[40],"install":[45],"malware.":[47],"The":[48],"common":[49],"idea":[50],"is":[51,124,228],"pressing":[53,103],"key":[55],"keyboard":[58],"cause":[60],"unique":[62],"and":[63,71,99,112,161,173,187],"subtle":[64],"environmental":[65,97,164],"change,":[66],"which":[67,238],"be":[69,88],"captured":[70],"analyzed":[72],"by":[73,166],"eavesdropper":[75],"learn":[77],"keystrokes.":[79],"For":[80],"these":[81,115],"attacks,":[82],"however,":[83],"training":[85,134,236],"phase":[86],"must":[87],"accomplished":[89],"establish":[91,154],"relationship":[93],"between":[94,157],"observed":[96,171],"change":[98,165],"action":[101],"specific":[105],"key.":[106],"This":[107],"significantly":[108],"limits":[109],"impact":[111,196],"practicality":[113],"attacks.":[116],"In":[117],"this":[118,138,181,198,204,226],"paper,":[119],"we":[120,153],"discover":[121],"it":[123],"possible":[125],"design":[127],"keystroke":[128],"eavesdropping":[129],"requiring":[132],"phase.":[135],"We":[136,179,200],"create":[137],"attack":[139,182],"based":[140],"on":[141,183],"channel":[143],"state":[144],"information":[145],"extracted":[146],"from":[147],"wireless":[148,211],"signal.":[149],"To":[150],"keystrokes,":[152,215],"mapping":[156],"typing":[158],"each":[159],"letter":[160],"its":[162],"respective":[163],"exploiting":[167],"correlation":[169],"among":[170],"changes":[172],"known":[174],"structures":[175],"dictionary":[177],"words.":[178],"implement":[180],"software-defined":[184],"radio":[185],"platforms":[186],"conduct":[188],"suite":[190],"experiments":[192],"validate":[194],"attack.":[199],"point":[201],"out":[202],"paper":[205,227],"does":[206],"not":[207],"propose":[208,230],"use":[210],"signal":[212],"inferring":[214],"since":[216],"such":[217],"already":[219],"exists.":[220],"Instead,":[221],"main":[223],"goal":[224],"techniques":[232],"remove":[234],"process,":[237],"make":[240],"existing":[241],"unpractical.":[243]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":6}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
