{"id":"https://openalex.org/W4386245218","doi":"https://doi.org/10.1109/infocom53939.2023.10228859","title":"Expelliarmus: Command Cancellation Attacks on Smartphones using Electromagnetic Interference","display_name":"Expelliarmus: Command Cancellation Attacks on Smartphones using Electromagnetic Interference","publication_year":2023,"publication_date":"2023-05-17","ids":{"openalex":"https://openalex.org/W4386245218","doi":"https://doi.org/10.1109/infocom53939.2023.10228859"},"language":"en","primary_location":{"id":"doi:10.1109/infocom53939.2023.10228859","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom53939.2023.10228859","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024947839","display_name":"Ming Gao","orcid":"https://orcid.org/0000-0002-1075-0564"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ming Gao","raw_affiliation_strings":["Zhejiang University,School of Cyber Science and Technology,China","ZJU-Hangzhou Global Scientific and Technological Innovation Center, China","School of Cyber Science and Technology, Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,School of Cyber Science and Technology,China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"ZJU-Hangzhou Global Scientific and Technological Innovation Center, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Technology, Zhejiang University, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100602821","display_name":"Fu Xiao","orcid":"https://orcid.org/0000-0003-1815-2793"},"institutions":[{"id":"https://openalex.org/I4210153300","display_name":"Shanghai Research Center for Wireless Communications","ror":"https://ror.org/04xfd0826","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210153300"]},{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fu Xiao","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications,School of Computer Science,China","School of Computer Science, Nanjing University of Posts and Telecommunications, China","Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications,School of Computer Science,China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, China","institution_ids":["https://openalex.org/I4210153300"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106418218","display_name":"Weiran Liu","orcid":"https://orcid.org/0009-0001-7465-1100"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiran Liu","raw_affiliation_strings":["Zhejiang University,School of Cyber Science and Technology,China","School of Cyber Science and Technology, Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,School of Cyber Science and Technology,China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Zhejiang University, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039366956","display_name":"Wentao Guo","orcid":"https://orcid.org/0000-0001-8058-8323"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wentao Guo","raw_affiliation_strings":["Zhejiang University,School of Cyber Science and Technology,China","School of Cyber Science and Technology, Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,School of Cyber Science and Technology,China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Zhejiang University, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101238580","display_name":"Yangtao Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yangtao Huang","raw_affiliation_strings":["Zhejiang University,School of Cyber Science and Technology,China","School of Cyber Science and Technology, Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,School of Cyber Science and Technology,China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Zhejiang University, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101411270","display_name":"Yajie Liu","orcid":"https://orcid.org/0000-0002-2323-0234"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yajie Liu","raw_affiliation_strings":["Zhejiang University,School of Cyber Science and Technology,China","School of Cyber Science and Technology, Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,School of Cyber Science and Technology,China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Zhejiang University, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023885705","display_name":"Jinsong Han","orcid":"https://orcid.org/0000-0001-5064-1955"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinsong Han","raw_affiliation_strings":["Zhejiang University,School of Cyber Science and Technology,China","Zhejiang Provincial Key Laboratory of Blockchain and Cyberspace Governance, China","School of Cyber Science and Technology, Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,School of Cyber Science and Technology,China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"Zhejiang Provincial Key Laboratory of Blockchain and Cyberspace Governance, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Technology, Zhejiang University, China","institution_ids":["https://openalex.org/I168879160"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5024947839"],"corresponding_institution_ids":["https://openalex.org/I168879160","https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.61,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65644364,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/touchscreen","display_name":"Touchscreen","score":0.9064080715179443},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7459425926208496},{"id":"https://openalex.org/keywords/interrupt","display_name":"Interrupt","score":0.7022860646247864},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.664749026298523},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6035099625587463},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5662438869476318},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5653636455535889},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5423321723937988},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.5411805510520935},{"id":"https://openalex.org/keywords/electromagnetic-interference","display_name":"Electromagnetic interference","score":0.4507383108139038},{"id":"https://openalex.org/keywords/notice","display_name":"Notice","score":0.44313228130340576},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.33584079146385193},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33137622475624084},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.2785721719264984},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1859142780303955},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15095102787017822},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13348659873008728}],"concepts":[{"id":"https://openalex.org/C2778539339","wikidata":"https://www.wikidata.org/wiki/Q165970","display_name":"Touchscreen","level":2,"score":0.9064080715179443},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7459425926208496},{"id":"https://openalex.org/C41661131","wikidata":"https://www.wikidata.org/wiki/Q220764","display_name":"Interrupt","level":3,"score":0.7022860646247864},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.664749026298523},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6035099625587463},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5662438869476318},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5653636455535889},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5423321723937988},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.5411805510520935},{"id":"https://openalex.org/C184892835","wikidata":"https://www.wikidata.org/wiki/Q1474513","display_name":"Electromagnetic interference","level":2,"score":0.4507383108139038},{"id":"https://openalex.org/C2779913896","wikidata":"https://www.wikidata.org/wiki/Q7063001","display_name":"Notice","level":2,"score":0.44313228130340576},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.33584079146385193},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33137622475624084},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2785721719264984},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1859142780303955},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15095102787017822},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13348659873008728},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom53939.2023.10228859","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom53939.2023.10228859","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322927","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884"},{"id":"https://openalex.org/F4320336125","display_name":"National Science Fund for Distinguished Young Scholars","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1470570003","https://openalex.org/W2038093357","https://openalex.org/W2074960873","https://openalex.org/W2080611336","https://openalex.org/W2089621879","https://openalex.org/W2098068517","https://openalex.org/W2106974856","https://openalex.org/W2123629701","https://openalex.org/W2151370481","https://openalex.org/W2207618852","https://openalex.org/W2467122692","https://openalex.org/W2486601119","https://openalex.org/W2759425808","https://openalex.org/W2799174307","https://openalex.org/W2805972105","https://openalex.org/W2890010784","https://openalex.org/W2897106987","https://openalex.org/W2907057563","https://openalex.org/W2919076405","https://openalex.org/W2933698448","https://openalex.org/W2954828948","https://openalex.org/W2962717526","https://openalex.org/W2979717817","https://openalex.org/W3006816054","https://openalex.org/W3015679345","https://openalex.org/W3033804066","https://openalex.org/W3093489396","https://openalex.org/W3100137403","https://openalex.org/W3153883853","https://openalex.org/W3203866400","https://openalex.org/W3212666643","https://openalex.org/W3213922268","https://openalex.org/W4226050909","https://openalex.org/W4283211061","https://openalex.org/W4283218317","https://openalex.org/W4285267073","https://openalex.org/W4288057774","https://openalex.org/W4288086180","https://openalex.org/W4300824008","https://openalex.org/W4308089456","https://openalex.org/W4308650818","https://openalex.org/W6628508383","https://openalex.org/W6748288002","https://openalex.org/W6750412548","https://openalex.org/W6847376154"],"related_works":["https://openalex.org/W2362245340","https://openalex.org/W2016136991","https://openalex.org/W4288898221","https://openalex.org/W2611740235","https://openalex.org/W2358308054","https://openalex.org/W2109690896","https://openalex.org/W2391783641","https://openalex.org/W2548919583","https://openalex.org/W4231875098","https://openalex.org/W3183694079"],"abstract_inverted_index":{"Human-machine":[0],"interactions":[1],"(HMIs),":[2],"e.g.,":[3,30,53,161],"touchscreens,":[4],"are":[5,15,183],"essential":[6],"for":[7,95],"users":[8,37],"to":[9],"interact":[10],"with":[11],"mobile":[12,28],"devices.":[13,106,199],"They":[14],"also":[16,150],"beneficial":[17],"in":[18,165],"resisting":[19],"emerging":[20],"active":[21,66,93,170],"attacks,":[22],"which":[23,156],"aim":[24],"at":[25],"maliciously":[26],"controlling":[27],"devices,":[29,83],"smartphones":[31],"and":[32,40,49,99,139],"tablets.":[33],"With":[34],"touchscreen-like":[35],"HMIs,":[36],"can":[38,157,172],"notice":[39],"interrupt":[41],"malicious":[42],"actions":[43],"conducted":[44],"by":[45,112,130,185],"the":[46,55,59,62,122,126,133,169,186,192],"attackers":[47],"timely":[48],"perform":[50],"necessary":[51],"countermeasures,":[52],"tapping":[54],"\u2018Quit\u2019":[56,162],"button":[57],"on":[58,196],"touchscreen.":[60],"However,":[61],"effect":[63],"of":[64,92,194],"HMI-oriented":[65],"attacks":[67,94],"has":[68],"not":[69],"been":[70],"investigated":[71],"yet.":[72],"In":[73],"this":[74,145],"paper,":[75],"we":[76,149],"present":[77],"a":[78,88,114,131,152],"practical":[79],"attack":[80,90,171],"towards":[81],"touch-based":[82],"namely":[84],"Expelliarmus.":[85],"It":[86],"reveals":[87],"new":[89],"surface":[91],"hijacking":[96],"users\u2019":[97,109,142],"operations":[98],"thus":[100,140],"taking":[101],"full":[102],"control":[103],"over":[104],"victim":[105],"Expelliarmus":[107,195],"neutralizes":[108],"touch":[110],"commands":[111],"producing":[113],"reverse":[115,123],"current":[116,124,127,137],"via":[117],"electromagnetic":[118],"interference":[119,164],"(EMI).":[120],"Since":[121],"offsets":[125],"change":[128,138],"caused":[129],"touch,":[132],"touchscreen":[134],"detects":[135],"no":[136],"ignores":[141],"commands.":[143],"Besides":[144],"basic":[146],"denial-of-service":[147],"attack,":[148,155],"realize":[151],"target":[153,159],"cancellation":[154],"neutralize":[158],"commands,":[160],"without":[163,176],"irrelevant":[166],"operations.":[167],"Thus,":[168],"be":[173],"completely":[174],"performed":[175],"interruption":[177],"from":[178],"users,":[179],"even":[180],"if":[181],"they":[182],"alerted":[184],"abnormal":[187],"events.":[188],"Extensive":[189],"evaluations":[190],"demonstrate":[191],"effectiveness":[193],"29":[197],"off-the-shelf":[198]},"counts_by_year":[{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
