{"id":"https://openalex.org/W2957423437","doi":"https://doi.org/10.1145/3321705.3329817","title":"MagAttack","display_name":"MagAttack","publication_year":2019,"publication_date":"2019-07-02","ids":{"openalex":"https://openalex.org/W2957423437","doi":"https://doi.org/10.1145/3321705.3329817","mag":"2957423437"},"language":"en","primary_location":{"id":"doi:10.1145/3321705.3329817","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3321705.3329817","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063893376","display_name":"Yushi Cheng","orcid":"https://orcid.org/0000-0002-0888-2322"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yushi Cheng","raw_affiliation_strings":["Zhejiang University &amp; Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University &amp; Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China","institution_ids":["https://openalex.org/I45928872","https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017116027","display_name":"Xiaoyu Ji","orcid":"https://orcid.org/0000-0002-1101-0007"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyu Ji","raw_affiliation_strings":["Zhejiang University &amp; Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University &amp; Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China","institution_ids":["https://openalex.org/I45928872","https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060351020","display_name":"Wenyuan Xu","orcid":"https://orcid.org/0000-0002-5043-9148"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyuan Xu","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100740620","display_name":"Hao Pan","orcid":"https://orcid.org/0000-0002-2531-0107"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Pan","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079428801","display_name":"Zhuangdi Zhu","orcid":"https://orcid.org/0000-0002-7418-731X"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhuangdi Zhu","raw_affiliation_strings":["Michigan State University, East Lansing, MI, USA"],"affiliations":[{"raw_affiliation_string":"Michigan State University, East Lansing, MI, USA","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033555836","display_name":"Chuang-Wen You","orcid":"https://orcid.org/0000-0002-6948-4213"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chuang-Wen You","raw_affiliation_strings":["National Taiwan University, Taipei, Taiwan Roc"],"affiliations":[{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009913466","display_name":"Yi\u2010Chao Chen","orcid":"https://orcid.org/0000-0003-0782-4953"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yi-Chao Chen","raw_affiliation_strings":["University of Texas at Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032760128","display_name":"Lili Qiu","orcid":"https://orcid.org/0000-0002-1590-9749"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lili Qiu","raw_affiliation_strings":["University of Texas at Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5063893376"],"corresponding_institution_ids":["https://openalex.org/I45928872","https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":1.6669,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.85570007,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"283","last_page":"294"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/laptop","display_name":"Laptop","score":0.8748385906219482},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8164512515068054},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.757339358329773},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7098492980003357},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6858716011047363},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6297465562820435},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5427087545394897},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.45454877614974976},{"id":"https://openalex.org/keywords/mobile-processor","display_name":"Mobile processor","score":0.4333500266075134},{"id":"https://openalex.org/keywords/power-consumption","display_name":"Power consumption","score":0.42389559745788574},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.419176310300827},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.32605642080307007},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.318151593208313},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3101630210876465},{"id":"https://openalex.org/keywords/mobile-technology","display_name":"Mobile technology","score":0.2794587016105652},{"id":"https://openalex.org/keywords/mobile-web","display_name":"Mobile Web","score":0.27809423208236694},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.23557794094085693},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18806782364845276},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17020326852798462}],"concepts":[{"id":"https://openalex.org/C2780008327","wikidata":"https://www.wikidata.org/wiki/Q3962","display_name":"Laptop","level":2,"score":0.8748385906219482},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8164512515068054},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.757339358329773},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7098492980003357},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6858716011047363},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6297465562820435},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5427087545394897},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45454877614974976},{"id":"https://openalex.org/C1665295","wikidata":"https://www.wikidata.org/wiki/Q6887219","display_name":"Mobile processor","level":5,"score":0.4333500266075134},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.42389559745788574},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.419176310300827},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32605642080307007},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.318151593208313},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3101630210876465},{"id":"https://openalex.org/C60952562","wikidata":"https://www.wikidata.org/wiki/Q6887246","display_name":"Mobile technology","level":3,"score":0.2794587016105652},{"id":"https://openalex.org/C516764902","wikidata":"https://www.wikidata.org/wiki/Q1043805","display_name":"Mobile Web","level":4,"score":0.27809423208236694},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.23557794094085693},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18806782364845276},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17020326852798462},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3321705.3329817","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3321705.3329817","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.7799999713897705}],"awards":[{"id":"https://openalex.org/G899972020","display_name":null,"funder_award_id":"61702451","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W110155494","https://openalex.org/W653593176","https://openalex.org/W1166075517","https://openalex.org/W1521422460","https://openalex.org/W1546509353","https://openalex.org/W1751370186","https://openalex.org/W1947877101","https://openalex.org/W1971044260","https://openalex.org/W1973132608","https://openalex.org/W1980592899","https://openalex.org/W1987710423","https://openalex.org/W1989417520","https://openalex.org/W2013716714","https://openalex.org/W2089468765","https://openalex.org/W2107146394","https://openalex.org/W2107816859","https://openalex.org/W2144219822","https://openalex.org/W2149359921","https://openalex.org/W2153635508","https://openalex.org/W2154909745","https://openalex.org/W2156447271","https://openalex.org/W2161708246","https://openalex.org/W2208250432","https://openalex.org/W2294170611","https://openalex.org/W2295760285","https://openalex.org/W2400528202","https://openalex.org/W2568392743","https://openalex.org/W2990598036","https://openalex.org/W3143654744"],"related_works":["https://openalex.org/W3153292769","https://openalex.org/W2045444909","https://openalex.org/W1516398359","https://openalex.org/W1901656956","https://openalex.org/W2990805456","https://openalex.org/W2941659365","https://openalex.org/W1991580985","https://openalex.org/W2004238918","https://openalex.org/W2086276201","https://openalex.org/W1987800707"],"abstract_inverted_index":{"Mobile":[0],"devices":[1],"have":[2,14,26],"emerged":[3],"as":[4],"the":[5,68,100,110,116,131,136,141,210],"most":[6],"popular":[7,183],"platforms":[8],"to":[9,30,76,99,130,158],"access":[10],"information.":[11],"However,":[12],"they":[13],"also":[15],"become":[16],"a":[17,43,48,55,61,74],"major":[18],"concern":[19],"of":[20,47,73,89,103,133,140,205,220],"privacy":[21,33],"violation":[22],"and":[23,83,114,135,152,169,177,185,207],"previous":[24],"researches":[25],"demonstrated":[27],"various":[28],"approaches":[29],"infer":[31,77],"user":[32,78],"based":[34],"on":[35,109,165],"mobile":[36,58,146],"devices.":[37,147],"In":[38],"this":[39],"paper,":[40],"we":[41],"study":[42],"new":[44],"side":[45,71],"channel":[46,72],"laptop":[49,75],"that":[50,92,124,194],"could":[51],"be":[52,107],"harvested":[53],"by":[54],"commercial-off-the-shelf":[56],"(COTS)":[57],"device,":[59],"eg,":[60],"smartphone.":[62],"We":[63,148,162],"propose":[64],"MagAttack,":[65],"which":[66,105],"exploits":[67],"electromagnetic":[69],"(EM)":[70],"activities,":[79],"i.e.,":[80],"application":[81,84],"launching":[82],"operation.":[85],"The":[86,191],"key":[87],"insight":[88],"MagAttack":[90,120,164,195],"is":[91,121],"applications":[93,134,184,200],"are":[94,127],"discrepant":[95],"in":[96,144,189],"essence":[97],"due":[98,129],"different":[101],"compositions":[102],"instructions,":[104],"can":[106,196],"reflected":[108],"CPU":[111],"power":[112],"consumption,":[113],"thus":[115],"corresponding":[117],"EM":[118,125,156],"emissions.":[119],"challenging":[122],"since":[123],"signals":[126,157],"noisy":[128,154],"dynamics":[132],"limited":[137],"sampling":[138],"rate":[139],"built-in":[142],"magnetometers":[143],"COTS":[145],"overcome":[149],"these":[150],"challenges":[151],"convert":[153],"coarse-grained":[155],"robust":[159],"fine-grained":[160],"features.":[161],"implement":[163],"both":[166],"an":[167,170,202,217],"iOS":[168],"Android":[171],"smartphone":[172],"without":[173],"any":[174],"hardware":[175],"modification,":[176],"evaluate":[178],"its":[179],"performance":[180],"with":[181,201,216],"13":[182,199],"50":[186,214],"top":[187],"websites":[188,215],"China.":[190],"results":[192],"demonstrate":[193],"recognize":[197],"aforementioned":[198],"average":[203,218],"accuracy":[204,219],"98.6%,":[206],"figure":[208],"out":[209],"visiting":[211],"operation":[212],"among":[213],"84.7%.":[221]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":11},{"year":2021,"cited_by_count":7},{"year":2019,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2019-07-23T00:00:00"}
