{"id":"https://openalex.org/W7124438491","doi":"https://doi.org/10.46586/tches.v2026.i1.376-401","title":"Active Electromagnetic Side-Channel Analysis: Crossing Physical Security Boundaries through Impedance Variations","display_name":"Active Electromagnetic Side-Channel Analysis: Crossing Physical Security Boundaries through Impedance Variations","publication_year":2026,"publication_date":"2026-01-16","ids":{"openalex":"https://openalex.org/W7124438491","doi":"https://doi.org/10.46586/tches.v2026.i1.376-401"},"language":null,"primary_location":{"id":"doi:10.46586/tches.v2026.i1.376-401","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2026.i1.376-401","pdf_url":null,"source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.46586/tches.v2026.i1.376-401","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049761643","display_name":"Taiki Kitazawa","orcid":"https://orcid.org/0000-0001-8480-8653"},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Taiki Kitazawa","raw_affiliation_strings":["Nara Institute of Science and Technology (NAIST), Japan"],"affiliations":[{"raw_affiliation_string":"Nara Institute of Science and Technology (NAIST), Japan","institution_ids":["https://openalex.org/I75917431"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054231782","display_name":"Lennert Wouters","orcid":"https://orcid.org/0000-0001-5740-5066"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Lennert Wouters","raw_affiliation_strings":["COSIC, KU Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"COSIC, KU Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002224407","display_name":"Benedikt Gierlichs","orcid":"https://orcid.org/0000-0002-5866-1990"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Benedikt Gierlichs","raw_affiliation_strings":["COSIC, KU Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"COSIC, KU Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123174328","display_name":"Daisuke Fujimoto","orcid":null},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Daisuke Fujimoto","raw_affiliation_strings":["Nara Institute of Science and Technology (NAIST), Japan"],"affiliations":[{"raw_affiliation_string":"Nara Institute of Science and Technology (NAIST), Japan","institution_ids":["https://openalex.org/I75917431"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006371356","display_name":"I. Verbauwhede","orcid":null},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Ingrid Verbauwhede","raw_affiliation_strings":["COSIC, KU Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"COSIC, KU Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123205487","display_name":"Yuichi Hayashi","orcid":null},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yuichi Hayashi","raw_affiliation_strings":["Nara Institute of Science and Technology (NAIST), Japan"],"affiliations":[{"raw_affiliation_string":"Nara Institute of Science and Technology (NAIST), Japan","institution_ids":["https://openalex.org/I75917431"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5049761643"],"corresponding_institution_ids":["https://openalex.org/I75917431"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24827985,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2026","issue":"1","first_page":"376","last_page":"401"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9733999967575073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9733999967575073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.004900000058114529,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.00419999985024333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.6365000009536743},{"id":"https://openalex.org/keywords/shielded-cable","display_name":"Shielded cable","score":0.5407000184059143},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.4943000078201294},{"id":"https://openalex.org/keywords/electrical-impedance","display_name":"Electrical impedance","score":0.4869000017642975},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.412200003862381},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4027000069618225},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35920000076293945},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.3587000072002411}],"concepts":[{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.6365000009536743},{"id":"https://openalex.org/C77590175","wikidata":"https://www.wikidata.org/wiki/Q3506009","display_name":"Shielded cable","level":2,"score":0.5407000184059143},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.4943000078201294},{"id":"https://openalex.org/C17829176","wikidata":"https://www.wikidata.org/wiki/Q179043","display_name":"Electrical impedance","level":2,"score":0.4869000017642975},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.4625999927520752},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.43549999594688416},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.412200003862381},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4027000069618225},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.39730000495910645},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3919999897480011},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35920000076293945},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.3587000072002411},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.34200000762939453},{"id":"https://openalex.org/C2265751","wikidata":"https://www.wikidata.org/wiki/Q332007","display_name":"Electromagnetic shielding","level":2,"score":0.31279999017715454},{"id":"https://openalex.org/C174268685","wikidata":"https://www.wikidata.org/wiki/Q769127","display_name":"High impedance","level":3,"score":0.31200000643730164},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.30880001187324524},{"id":"https://openalex.org/C2780378346","wikidata":"https://www.wikidata.org/wiki/Q1349983","display_name":"Leak","level":2,"score":0.304500013589859},{"id":"https://openalex.org/C172385210","wikidata":"https://www.wikidata.org/wiki/Q5339","display_name":"Transistor","level":3,"score":0.303600013256073},{"id":"https://openalex.org/C125470083","wikidata":"https://www.wikidata.org/wiki/Q747288","display_name":"Electromagnetic compatibility","level":2,"score":0.2962999939918518},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.2669000029563904},{"id":"https://openalex.org/C32976094","wikidata":"https://www.wikidata.org/wiki/Q1515253","display_name":"Leakage inductance","level":4,"score":0.26510000228881836},{"id":"https://openalex.org/C64183698","wikidata":"https://www.wikidata.org/wiki/Q4530886","display_name":"Electromagnetic environment","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C14589660","wikidata":"https://www.wikidata.org/wiki/Q64122","display_name":"Electromagnetic pulse","level":2,"score":0.260699987411499},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.25769999623298645}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tches.v2026.i1.376-401","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2026.i1.376-401","pdf_url":null,"source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/781729","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/20.500.12942/781729","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2026 (1), (376-401)","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.46586/tches.v2026.i1.376-401","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2026.i1.376-401","pdf_url":null,"source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Embedded":[0],"devices":[1],"that":[2,28,103,172],"are":[3,11,154],"physically":[4],"unreachable":[5],"or":[6],"contained":[7],"within":[8,73],"tamperproof":[9],"enclosures":[10],"often":[12],"considered":[13],"naturally":[14],"resilient":[15],"to":[16,65,113,120,128,227],"physical":[17,39,195,312],"side-channel":[18,25,46,167,173],"attacks.":[19],"We":[20,169],"present":[21,257],"an":[22,187],"active":[23,303],"EM":[24,136,212,273,282,304],"attack":[26,206,238],"technique":[27,43,239],"enables":[29],"sidechannel":[30],"attacks":[31,174],"across":[32],"the":[33,62,66,74,77,81,90,94,114,117,122,129,133,140,144,157,179,183,215,222,230,252,265,270,299],"security":[34,40,145,196,313],"boundaries":[35],"introduced":[36],"by":[37,86,139,156,194],"these":[38],"measures.":[41],"Our":[42],"actively":[44,228],"induces":[45],"leakage":[47,59,79,149],"based":[48],"on":[49,182],"a":[50,56,125,148,199,244,307],"relay":[51],"mechanism,":[52],"which":[53],"serves":[54],"as":[55,101,105,166,249,306],"means":[57],"of":[58,96,116,124,160,186,217,224,234,247,254,272,301],"propagation":[60],"from":[61,142,178],"cryptographic":[63,91,130],"IC":[64,92],"attacker":[67,141],"via":[68],"intermediate":[69],"Relay":[70,106,161],"Points":[71],"located":[72],"boundary.":[75],"In":[76,132],"first":[78],"path,":[80,135],"instantaneous":[82],"current":[83],"consumption":[84],"caused":[85],"transistor":[87],"switching":[88],"inside":[89],"affects":[93],"impedance":[95,158],"nearby":[97],"nonlinear":[98,255],"elements":[99,256],"(such":[100],"regulators)":[102],"act":[104],"Points.":[107],"This":[108,205,296],"phenomenon":[109],"is":[110],"inevitable":[111],"due":[112],"necessity":[115],"regulator\u2019s":[118],"operations":[119],"ensure":[121],"provision":[123],"stable":[126],"voltage":[127],"IC.":[131],"second":[134],"waves":[137,153,213],"irradiated":[138],"outside":[143,165],"boundary":[146],"create":[147],"channel":[150],"where":[151],"reflected":[152],"modulated":[155],"variation":[159],"Points,":[162],"and":[163,202,220,232,289],"leak":[164],"information.":[168],"experimentally":[170],"demonstrate":[171],"can":[175,207],"be":[176,208,241],"performed":[177],"power":[180],"cable":[181],"primary":[184],"side":[185],"AC/DC":[188],"adapter,":[189],"even":[190],"in":[191,214,243,258,311],"environments":[192],"protected":[193],"measures,":[197],"including":[198],"shielded":[200],"box":[201],"ferrite":[203],"cores.":[204],"executed":[209],"non-invasively":[210],"using":[211],"hundreds":[216],"MHz":[218],"band,":[219],"has":[221],"advantage":[223],"being":[225],"able":[226],"control":[229],"presence":[231],"intensity":[233],"leakage.":[235],"The":[236],"proposed":[237,266],"may":[240],"applicable":[242],"wide":[245],"range":[246],"applications":[248],"it":[250],"exploits":[251],"behavior":[253],"all":[259],"embedded":[260],"systems.":[261],"As":[262],"countermeasures":[263],"against":[264],"attack,":[267],"we":[268],"discuss":[269],"effectiveness":[271],"fault":[274],"sensors":[275],"for":[276],"detecting":[277],"continuous":[278],"wave":[279],"irradiation,":[280],"induced":[281],"interference":[283],"detectors":[284],"with":[285],"broadband":[286],"monitoring":[287],"capabilities,":[288],"tamper":[290],"detection":[291],"systems":[292],"utilizing":[293],"radio":[294],"frequencies.":[295],"research":[297],"highlights":[298],"importance":[300],"considering":[302],"measurements":[305],"new":[308],"threat":[309],"model":[310],"evaluations.":[314]},"counts_by_year":[],"updated_date":"2026-01-17T23:15:25.596738","created_date":"2026-01-17T00:00:00"}
