{"id":"https://openalex.org/W2918566670","doi":"https://doi.org/10.1109/msp.2018.2888893","title":"A New Way to Detect Cyberattacks: Extracting Changes in Register Values From Radio-Frequency Side Channels","display_name":"A New Way to Detect Cyberattacks: Extracting Changes in Register Values From Radio-Frequency Side Channels","publication_year":2019,"publication_date":"2019-02-26","ids":{"openalex":"https://openalex.org/W2918566670","doi":"https://doi.org/10.1109/msp.2018.2888893","mag":"2918566670"},"language":"en","primary_location":{"id":"doi:10.1109/msp.2018.2888893","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msp.2018.2888893","pdf_url":null,"source":{"id":"https://openalex.org/S120977877","display_name":"IEEE Signal Processing Magazine","issn_l":"1053-5888","issn":["1053-5888","1558-0792"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083976309","display_name":"Ronald A. Riley","orcid":"https://orcid.org/0000-0003-1592-3345"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ronald A. Riley","raw_affiliation_strings":["Physics, University of California, San Diego"],"raw_orcid":"https://orcid.org/0000-0003-1592-3345","affiliations":[{"raw_affiliation_string":"Physics, University of California, San Diego","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103173067","display_name":"James Graham","orcid":"https://orcid.org/0000-0003-1375-3207"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James T. Graham","raw_affiliation_strings":["Electrical engineering, University of Michigan, Ann Arbor"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Electrical engineering, University of Michigan, Ann Arbor","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069431137","display_name":"Ryan M. Fuller","orcid":null},"institutions":[{"id":"https://openalex.org/I19648265","display_name":"Wright State University","ror":"https://ror.org/04qk6pt94","country_code":"US","type":"education","lineage":["https://openalex.org/I19648265"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ryan M. Fuller","raw_affiliation_strings":["Electrical engineering, Wright State University, Dayton, Ohio"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Electrical engineering, Wright State University, Dayton, Ohio","institution_ids":["https://openalex.org/I19648265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112775921","display_name":"Rusty O. Baldwin","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rusty O. Baldwin","raw_affiliation_strings":["Electrical engineering, Virginia Polytechnic Institute and State University, Blacksburg"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Electrical engineering, Virginia Polytechnic Institute and State University, Blacksburg","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055778914","display_name":"Ashwin Fisher","orcid":null},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ashwin Fisher","raw_affiliation_strings":["Mechanical engineering, Boston University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Mechanical engineering, Boston University","institution_ids":["https://openalex.org/I111088046"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5083976309"],"corresponding_institution_ids":["https://openalex.org/I36258959"],"apc_list":null,"apc_paid":null,"fwci":1.9744,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.8542669,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"36","issue":"2","first_page":"49","last_page":"58"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.8269531726837158},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7854770421981812},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6001428365707397},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5630663633346558},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5508355498313904},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4625726342201233},{"id":"https://openalex.org/keywords/microcode","display_name":"Microcode","score":0.44449153542518616},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.41598063707351685},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3689020276069641},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3276800811290741},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2975471019744873},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.22099897265434265},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1690281629562378}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.8269531726837158},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7854770421981812},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6001428365707397},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5630663633346558},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5508355498313904},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4625726342201233},{"id":"https://openalex.org/C22174128","wikidata":"https://www.wikidata.org/wiki/Q175869","display_name":"Microcode","level":2,"score":0.44449153542518616},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41598063707351685},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3689020276069641},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3276800811290741},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2975471019744873},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22099897265434265},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1690281629562378},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/msp.2018.2888893","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msp.2018.2888893","pdf_url":null,"source":{"id":"https://openalex.org/S120977877","display_name":"IEEE Signal Processing Magazine","issn_l":"1053-5888","issn":["1053-5888","1558-0792"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6090094008","display_name":null,"funder_award_id":"FA8650-16-C-7624","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"}],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1490557050","https://openalex.org/W2006207603","https://openalex.org/W2009190171","https://openalex.org/W2019244928","https://openalex.org/W2038554971","https://openalex.org/W2171819552","https://openalex.org/W2184623857","https://openalex.org/W2358108086","https://openalex.org/W2564479312","https://openalex.org/W2751592946","https://openalex.org/W2799300550","https://openalex.org/W2800526919","https://openalex.org/W2802642963","https://openalex.org/W2954728818","https://openalex.org/W4253642498"],"related_works":["https://openalex.org/W1966431236","https://openalex.org/W608147619","https://openalex.org/W2026551898","https://openalex.org/W1984676852","https://openalex.org/W4252104358","https://openalex.org/W2062160093","https://openalex.org/W2025981307","https://openalex.org/W1998626163","https://openalex.org/W2056006243","https://openalex.org/W2039978824"],"abstract_inverted_index":{"The":[0],"Internet":[1,7],"of":[2,8,38,50,111],"Things":[3],"(IoT)":[4],"and":[5,32,40,103],"the":[6,30,47,89,115],"Everything":[9],"(IoE)":[10],"have":[11],"driven":[12],"processors":[13,68,94],"into":[14,46,82],"nearly":[15],"every":[16],"powered":[17],"device,":[18],"from":[19,95],"thermostats":[20],"to":[21,23,69,75,106],"refrigerators":[22],"light":[24],"bulbs.":[25],"From":[26],"a":[27,35,51],"security":[28],"perspective,":[29],"IoT":[31,83],"IoE":[33],"create":[34],"new":[36],"layer":[37],"signals":[39],"systems":[41],"that":[42,79],"can":[43],"provide":[44],"insight":[45],"internal":[48],"operations":[49],"device":[52],"via":[53],"analog":[54,63],"side":[55,64],"channels.":[56],"Our":[57,72,98],"research":[58],"focuses":[59],"on":[60,92,114],"leveraging":[61],"these":[62],"channels":[65],"in":[66,88],"IoT/IoE":[67],"detect":[70],"intrusions.":[71],"goal":[73],"is":[74],"defend":[76],"against":[77],"cyberattacks":[78],"insert":[80],"malware":[81],"devices":[84],"by":[85],"detecting":[86],"deviations":[87],"code":[90,112],"running":[91,113],"their":[93],"known":[96],"firmware.":[97],"approach":[99],"applies":[100],"signal":[101],"processing":[102],"machine-learning":[104],"techniques":[105],"collected":[107],"radio-frequency":[108],"(RF)":[109],"emissions":[110],"processor.":[116]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
