{"id":"https://openalex.org/W4287770216","doi":"https://doi.org/10.13154/tches.v2020.i3.358-401","title":"Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks","display_name":"Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks","publication_year":2020,"publication_date":"2020-06-19","ids":{"openalex":"https://openalex.org/W4287770216","doi":"https://doi.org/10.13154/tches.v2020.i3.358-401"},"language":"en","primary_location":{"id":"pmh:oai:HAL:hal-04138258v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04138258","pdf_url":null,"source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 3, &#x27E8;10.13154/tches.v2020.i3.358-401&#x27E9;","raw_type":"Journal articles"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hal.science/hal-04138258","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011010002","display_name":"Giovanni Camurati","orcid":"https://orcid.org/0000-0003-3510-6895"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Camurati, Giovanni","raw_affiliation_strings":["EURECOM, Sophia-Antipolis, France"],"affiliations":[{"raw_affiliation_string":"EURECOM, Sophia-Antipolis, France","institution_ids":["https://openalex.org/I1902872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009355477","display_name":"Aur\u00e9lien Francillon","orcid":"https://orcid.org/0000-0003-0584-8732"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Francillon, Aur\u00e9lien","raw_affiliation_strings":["EURECOM, Sophia-Antipolis, France"],"affiliations":[{"raw_affiliation_string":"EURECOM, Sophia-Antipolis, France","institution_ids":["https://openalex.org/I1902872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070542865","display_name":"Fran\u00e7ois\u2010Xavier Standaert","orcid":"https://orcid.org/0000-0001-7444-0285"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Standaert, Fran\u00e7ois-Xavier","raw_affiliation_strings":["Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011010002"],"corresponding_institution_ids":["https://openalex.org/I1902872"],"apc_list":null,"apc_paid":null,"fwci":0.2944,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.59936673,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.8776999711990356,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.8776999711990356,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/screaming","display_name":"Screaming","score":0.972560703754425},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.3654027581214905},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3354894518852234},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.1241445243358612},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.054399967193603516}],"concepts":[{"id":"https://openalex.org/C2780778659","wikidata":"https://www.wikidata.org/wiki/Q1932016","display_name":"Screaming","level":2,"score":0.972560703754425},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.3654027581214905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3354894518852234},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.1241445243358612},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.054399967193603516}],"mesh":[],"locations_count":4,"locations":[{"id":"pmh:oai:HAL:hal-04138258v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04138258","pdf_url":null,"source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 3, &#x27E8;10.13154/tches.v2020.i3.358-401&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:dial.uclouvain.be:boreal:241540","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/241540","pdf_url":null,"source":{"id":"https://openalex.org/S4306401902","display_name":"Digital Access to Libraries (Universit\u00e9 catholique de Louvain (UCL), l'Universit\u00e9 de Namur (UNamur) and the Universit\u00e9 Saint-Louis (USL-B))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I95674353","host_organization_name":"UCLouvain","host_organization_lineage":["https://openalex.org/I95674353"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020, no.3, p. 358-401 (2020)","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:c3b53a5322994627ba822347dd0b93ce","is_oa":true,"landing_page_url":"https://doaj.org/article/c3b53a5322994627ba822347dd0b93ce","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)","raw_type":"article"},{"id":"doi:10.13154/tches.v2020.i3.358-401","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tches.v2020.i3.358-401","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-04138258v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04138258","pdf_url":null,"source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 3, &#x27E8;10.13154/tches.v2020.i3.358-401&#x27E9;","raw_type":"Journal articles"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2749386307","display_name":null,"funder_award_id":"ANR 2016","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G6197564305","display_name":"DAta Protection of COnnected Devices and Smartphones","funder_award_id":"ANR-16-CE25-0015","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"}],"funders":[{"id":"https://openalex.org/F4320320883","display_name":"Agence Nationale de la Recherche","ror":"https://ror.org/00rbzpz17"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2017559905","https://openalex.org/W4242552689","https://openalex.org/W1562338856","https://openalex.org/W2024196480","https://openalex.org/W2343742997","https://openalex.org/W2022384299","https://openalex.org/W2073543149","https://openalex.org/W2287560056"],"abstract_inverted_index":{"Recently,":[0],"some":[1,208],"wireless":[2],"devices":[3],"have":[4],"been":[5],"found":[6],"vulnerable":[7],"to":[8,201,221,278],"a":[9,33,55,80,110,166,180,216,222,227,265],"novel":[10,93,256],"class":[11],"of":[12,75,83,91,114,118,128,135,143,148,154,213,219,234,254,269,284],"side-channel":[13],"attacks,":[14,250],"called":[15],"Screaming":[16,119],"Channels.":[17,120],"These":[18],"leaks":[19,25],"might":[20],"appear":[21],"if":[22],"the":[23,27,38,46,60,72,84,92,115,126,133,141,144,146,149,152,155,191,211,231,239,245,252,255,260,270,273,282],"sensitive":[24],"from":[26],"processor":[28],"are":[29,102],"unintentionally":[30],"broadcast":[31],"by":[32],"radio":[34,276],"transmitter":[35],"placed":[36],"on":[37,44,50,140],"same":[39],"chip.":[40],"Previous":[41],"work":[42,243],"focuses":[43],"identifying":[45],"root":[47],"causes,":[48],"and":[49,95,130,137,151,197,275,281],"mounting":[51],"an":[52,76,186],"attack":[53,179,229,257],"at":[54,183],"distance":[56,136],"considerably":[57],"larger":[58],"than":[59],"one":[61,240],"achievable":[62],"with":[63,171,194],"conventional":[64],"electromagnetic":[65],"side":[66],"channels,":[67],"which":[68],"was":[69],"demonstrated":[70],"in":[71,98,185,210],"low-noise":[73],"environment":[74],"anechoic":[77],"chamber.":[78],"However,":[79],"detailed":[81],"understanding":[82],"leak,":[85,145],"attacks":[86,209],"that":[87],"take":[88],"full":[89],"advantage":[90],"vector,":[94],"security":[96,267],"evaluations":[97],"more":[99,248],"practical":[100],"scenarios":[101],"still":[103],"missing.":[104],"In":[105],"this":[106,242],"paper,":[107],"we":[108,123,160,178,206,225],"conduct":[109],"thorough":[111],"experimental":[112],"analysis":[113],"peculiar":[116],"properties":[117],"For":[121],"example,":[122],"learn":[124],"about":[125],"coexistence":[127],"intended":[129],"unintended":[131],"data,":[132],"role":[134],"other":[138,261],"parameters":[139],"strength":[142],"distortion":[147],"leakmodel,":[150],"portability":[153],"profiles.":[156],"With":[157],"such":[158],"insights,":[159],"build":[161],"better":[162],"attacks.":[163],"We":[164,189],"profile":[165],"device":[167],"connected":[168],"via":[169],"cable":[170],"10000\u00b7500":[172],"traces.":[173],"Then,":[174],"5":[175],"months":[176],"later,":[177],"different":[181],"instance":[182],"15m":[184],"office":[187],"environment.":[188],"recover":[190],"AES-128":[192],"key":[193,198],"5000\u00b71000":[195],"traces":[196],"enumeration":[199],"up":[200],"223.":[202],"Leveraging":[203],"spatial":[204],"diversity,":[205],"mount":[207],"presence":[212],"obstacles.":[214],"As":[215],"first":[217],"example":[218],"application":[220],"real":[223],"system,":[224],"show":[226],"proof-of-concept":[228],"against":[230],"authentication":[232],"method":[233],"Google":[235],"Eddystone":[236],"beacons.":[237],"On":[238,259],"side,":[241,262],"lowers":[244],"bar":[246],"for":[247],"realistic":[249],"highlighting":[251],"importance":[253],"vector.":[258],"it":[263],"provides":[264],"broader":[266],"evaluation":[268],"leaks,":[271],"helping":[272],"defender":[274],"designers":[277],"evaluate":[279],"risk,":[280],"need":[283],"countermeasures.":[285]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-12T07:58:50.170612","created_date":"2025-10-10T00:00:00"}
