{"id":"https://openalex.org/W4402955723","doi":"https://doi.org/10.1145/3678890.3678917","title":"Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic Emanations","display_name":"Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic Emanations","publication_year":2024,"publication_date":"2024-09-29","ids":{"openalex":"https://openalex.org/W4402955723","doi":"https://doi.org/10.1145/3678890.3678917"},"language":"en","primary_location":{"id":"doi:10.1145/3678890.3678917","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3678890.3678917","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053433166","display_name":"Wenfan Song","orcid":"https://orcid.org/0000-0003-1769-8540"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenfan Song","raw_affiliation_strings":["Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100425087","display_name":"Jianwei Liu","orcid":"https://orcid.org/0000-0001-9003-8667"},"institutions":[{"id":"https://openalex.org/I4400573310","display_name":"Hangzhou City University","ror":"https://ror.org/01wck0s05","country_code":null,"type":"education","lineage":["https://openalex.org/I4400573310"]},{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN","MO"],"is_corresponding":false,"raw_author_name":"Jianwei Liu","raw_affiliation_strings":["Zhejiang University, China and Hangzhou City University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, China and Hangzhou City University, China","institution_ids":["https://openalex.org/I76130692","https://openalex.org/I6469544","https://openalex.org/I4400573310"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029538266","display_name":"Yajie Liu","orcid":"https://orcid.org/0000-0002-9667-360X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yajie Liu","raw_affiliation_strings":["Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023885705","display_name":"Jinsong Han","orcid":"https://orcid.org/0000-0001-5064-1955"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinsong Han","raw_affiliation_strings":["Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5053433166"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.4894,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62818909,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"660","last_page":"673"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6432758569717407},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.48787832260131836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4502972960472107},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.11853417754173279}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6432758569717407},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.48787832260131836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4502972960472107},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.11853417754173279}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3678890.3678917","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3678890.3678917","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1989109597","https://openalex.org/W2057600717","https://openalex.org/W2122837018","https://openalex.org/W2144411949","https://openalex.org/W2259549875","https://openalex.org/W2295760285","https://openalex.org/W2897688655","https://openalex.org/W2915439154","https://openalex.org/W2969539858","https://openalex.org/W2985766404","https://openalex.org/W2990457731","https://openalex.org/W3003450887","https://openalex.org/W3047566092","https://openalex.org/W3092580650","https://openalex.org/W3111004365","https://openalex.org/W3137928671","https://openalex.org/W3157744394","https://openalex.org/W3198109319","https://openalex.org/W3204118745","https://openalex.org/W4200002434","https://openalex.org/W4232230140","https://openalex.org/W4253642498","https://openalex.org/W4285228252","https://openalex.org/W4288057697","https://openalex.org/W4306250185","https://openalex.org/W4386260584"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2473956133","https://openalex.org/W3177248053"],"abstract_inverted_index":{"External":[0],"disks":[1,154],"(abbr.,":[2],"disks)":[3],"are":[4],"common":[5],"data":[6,70],"storage":[7],"peripherals":[8],"for":[9],"hosts.":[10],"Verifying":[11],"the":[12,97,118,123,128,133],"disk\u2019s":[13],"legitimacy":[14],"is":[15,64],"crucial":[16],"to":[17,95,116,192],"prevent":[18],"security":[19,134],"issues":[20],"on":[21,50,80],"a":[22,40,85,110,139,175],"host":[23],"like":[24],"privacy":[25],"leakage":[26],"and":[27,43,121,160,168],"virus":[28],"propagation":[29],"before":[30],"interaction":[31],"setup.":[32],"To":[33,131],"address":[34],"this":[35],"issue,":[36],"we":[37,83,137],"propose":[38,109,138],"DiskPrint,":[39,136],"novel":[41],"non-intrusive":[42],"replay-resistant":[44,141],"disk":[45,101,157],"authentication":[46,177],"system":[47],"that":[48,65,172],"relies":[49],"unintentional":[51],"electromagnetic":[52,81],"(EM)":[53],"emanations":[54],"from":[55,103,165],"disks\u2019":[56],"internal":[57],"components.":[58],"The":[59],"core":[60],"idea":[61],"of":[62,99,112,127,135],"DiskPrint":[63,173],"EM":[66,89,105,119,129,148],"signals":[67,90],"emitted":[68],"during":[69],"writing":[71],"can":[72],"reflect":[73],"hardware":[74],"discrepancies":[75],"among":[76],"different":[77],"disks.":[78],"Based":[79],"principles,":[82],"establish":[84],"theoretical":[86],"model":[87],"associating":[88],"with":[91,152],"built-in":[92],"electronic":[93],"components":[94],"demonstrate":[96],"feasibility":[98],"extracting":[100],"fingerprints":[102],"such":[104],"emanations.":[106],"We":[107],"also":[108],"series":[111],"signal":[113],"enhancement":[114],"methods":[115],"remove":[117],"interface":[120],"improve":[122],"signal-to-noise":[124],"ratio":[125],"(SNR)":[126],"measurements.":[130],"boost":[132],"device-agnostic":[140],"method":[142],"by":[143],"introducing":[144],"randomness":[145],"into":[146],"leaked":[147],"signals.":[149],"Real-world":[150],"experiments":[151],"60":[153],"including":[155],"hard":[156],"drives":[158,163],"(HDDs)":[159],"solid":[161],"state":[162],"(SSDs)":[164],"seven":[166],"brands":[167],"14":[169],"models":[170],"indicate":[171],"achieves":[174],"99%+":[176],"success":[178],"rate.":[179],"Robustness":[180],"analysis":[181],"demonstrates":[182],"DiskPrint\u2019s":[183],"stability":[184],"over":[185],"time.":[186],"Security":[187],"study":[188],"shows":[189],"its":[190],"ability":[191],"defend":[193],"against":[194],"various":[195],"attacks.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
