Page 352 - 《软件学报》2025年第5期
P. 352
2252 软件学报 2025 年第 36 卷第 5 期
sensing. In: Proc. of the 2021 IEEE Conf. on Computer Communications. Vancouver: IEEE, 2021. 1–10. [doi: 10.1109/
INFOCOM42981.2021.9488866]
[100] Zhou B, Lohokare J, Gao RP, Ye F. EchoPrint: Two-factor authentication using acoustics and vision on smartphones. In: Proc. of the
24th Annual Int’l Conf. on Mobile Computing and Networking. New Delhi: ACM, 2018. 321–336. [doi: 10.1145/3241539.3241575]
[101] Chen HJ, Li F, Du W, Yang S, Conn M, Wang Y. Listen to your fingers: User authentication based on geometry biometrics of touch
gesture. Proc. of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2020, 4(3): 75. [doi: 10.1145/3411809]
[102] Chen YL, Ni T, Xu WT, Gu T. SwipePass: Acoustic-based second-factor user authentication for smartphones. Proc. of the ACM on
Interactive, Mobile, Wearable and Ubiquitous Technologies, 2022, 6(3): 106. [doi: 10.1145/3550292]
[103] Zhou M, Wang Q, Lin X, Zhao Y, Jiang PP, Li Q, Shen C, Wang C. PressPIN: Enabling secure PIN authentication on mobile devices
via structure-borne sounds. IEEE Trans. on Dependable and Secure Computing, 2023, 20(2): 1228–1242. [doi: 10.1109/TDSC.2022.
3151889]
[104] Wu C, Chen J, He K, Zhao ZM, Du RY, Zhang C. EchoHand: High accuracy and presentation attack resistant hand authentication on
commodity mobile devices. In: Proc. of the 2022 ACM SIGSAC Conf. on Computer and Communications Security. Los Angeles: ACM,
2022. 2931–2945. [doi: 10.1145/3548606.3560553]
[105] Han DQ, Chen YM, Li T, Zhang R, Zhang YC, Hedgpeth T. Proximity-proof: Secure and usable mobile two-factor authentication. In:
Proc. of the 24th Annual Int’l Conf. on Mobile Computing and Networking. New Delhi: ACM, 2018. 401–415. [doi: 10.1145/3241539.
3241574]
[106] Wu LB, Yang JX, Zhou M, Chen YJ, Wang Q. LVID: A multimodal biometrics authentication system on smartphones. IEEE Trans. on
Information Forensics and Security, 2020, 15: 1572–1585. [doi: 10.1109/TIFS.2019.2944058]
[107] Yang YL, Wang Y, Chen YY, Wang C. EchoLock: Towards low-effort mobile user identification leveraging structure-borne echos. In:
Proc. of the 15th ACM Asia Conf. on Computer and Communications Security. Taipei: ACM, 2020. 772–783. [doi: 10.1145/3320269.
3384741]
[108] Zhang SH, Das A. HandLock: Enabling 2-FA for smart home voice assistants using inaudible acoustic signal. In: Proc. of the 24th Int’l
Symp. on Research in Attacks, Intrusions and Defenses. San Sebastian: ACM, 2021. 251–265. [doi: 10.1145/3471621.3471866]
[109] Liu D, Wang Q, Zhou M, Jiang PP, Li Q, Shen C, Wang C. SoundID: Securing mobile two-factor authentication via acoustic signals.
IEEE Trans. on Dependable and Secure Computing, 2023, 20(2): 1687–1701. [doi: 10.1109/TDSC.2022.3162718]
[110] Wang ZF, Wei G, He QH. Channel pattern noise based playback attack detection algorithm for speaker recognition. In: Proc. of the 2011
Int’l Conf. on Machine Learning and Cybernetics. Guilin: IEEE, 2011. 1708–1713. [doi: 10.1109/ICMLC.2011.6016982]
[111] Zhang LH, Tan S, Yang J, Chen YY. Voicelive: A phoneme localization based liveness detection for voice authentication on
smartphones. In: Proc. of the 2016 ACM SIGSAC Conf. on Computer and Communications Security. Vienna: ACM, 2016. 1080–1091.
[doi: 10.1145/2976749.2978296]
[112] Shang JC, Chen S, Wu J. Defending against voice spoofing: A robust software-based liveness detection system. In: Proc. of the 15th
IEEE Int’l Conf. on Mobile Ad Hoc and Sensor Systems. Chengdu: IEEE, 2018. 28–36. [doi: 10.1109/MASS.2018.00016]
[113] Jiang PP, Wang Q, Lin X, Zhou M, Ding WB, Wang C, Shen C, Li Q. Securing liveness detection for voice authentication via pop
noises. IEEE Trans. on Dependable and Secure Computing, 2023, 20(2): 1702–1718. [doi: 10.1109/TDSC.2022.3163024]
[114] Wang Y, Cai WD, Gu T, Shao W, Li YN, Yu Y. Secure your voice: An oral airflow-based continuous liveness detection for voice
assistants. Proc. of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2020, 3(4): 157. [doi: 10.1145/3369811]
[115] Yan C, Long Y, Ji XY, Xu WY. The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification.
In: Proc. of the 2019 ACM SIGSAC Conf. on Computer and Communications Security. London: ACM, 2019. 1215–1229. [doi: 10.1145/
3319535.3354248]
[116] Ahmed ME, Kwak IY, Huh JH, Kim I, Oh T, Kim H. VOID: A fast and light voice liveness detection system. In: Proc. of the 29th
USENIX Security Symp. USENIX Association, 2020. 2685–2702.
[117] Li ZH, Shi C, Zhang TF, Xie Y, Liu J, Yuan B, Chen YY. Robust detection of machine-induced audio attacks in intelligent audio
systems with microphone array. In: Proc. of the 2021 ACM SIGSAC Conf. on Computer and Communications Security. ACM, 2021.
1884–1899. [doi: 10.1145/3460120.3484755]
[118] Meng Y, Li JC, Pillari M, Deopujari A, Brennan L, Shamsie H, Zhu HJ, Tian Y. Your microphone array retains your identity: A robust
voice liveness detection system for smart speakers. In: Proc. of the 31st USENIX Security Symp. Boston: USENIX Association, 2022.
1077–1094.
[119] Zhang LH, Tan S, Chen YY, Yang J. A continuous articulatory-gesture-based liveness detection for voice authentication on smart
devices. IEEE Internet of Things Journal, 2022, 9(23): 23320–23331. [doi: 10.1109/JIOT.2022.3199995]