{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T22:40:41Z","timestamp":1725835241127},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319263618"},{"type":"electronic","value":"9783319263625"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26362-5_2","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T10:10:45Z","timestamp":1445854245000},"page":"26-47","source":"Crossref","is-referenced-by-count":2,"title":["Physical-Layer Detection of Hardware Keyloggers"],"prefix":"10.1007","author":[{"given":"Ryan M.","family":"Gerdes","sequence":"first","affiliation":[]},{"given":"Saptarshi","family":"Mallick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,12]]},"reference":[{"key":"2_CR1","unstructured":"ABC News: Former Cal State student gets year in prison for rigging campus election (2013). \n                      http:\/\/abcnews.go.com\/US\/cal-state-student-year-prison-rigging-campus-election\/story?id=19682401"},{"key":"2_CR2","unstructured":"Analog Devices: AD7265 Differential\/Single-Ended Input, Dual 1 MSPS, 12-Bit, 3-Channel SAR ADC (2006), datasheet"},{"issue":"7","key":"2_CR3","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/S1361-3723(07)70090-8","volume":"2007","author":"S Chahrvin","year":"2007","unstructured":"Chahrvin, S.: Keyloggers\u2013your security nightmare? Comput. Fraud Secur. 2007(7), 10\u201311 (2007)","journal-title":"Comput. Fraud Secur."},{"key":"2_CR4","unstructured":"Chapweske, A.: The ps\/2 mouse\/keyboard protocol (2003). \n                      http:\/\/www.computer-engineering.org\/ps2protocol"},{"key":"2_CR5","unstructured":"Danev, B.: Physical-layer Identification of Wireless Devices. Ph.D. thesis, ETH Zurich, Zurich, Switzerland (2011)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Danev, B., Luecken, H., Capkun, S., Defrawy, K.E.: Attacks on physical-layer identification. In: Proceedings of the Third ACM Conference on Wireless Network Security (WiSec 2010), pp. 89\u201398. ACM, New York (2010)","DOI":"10.1145\/1741866.1741882"},{"issue":"1","key":"2_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/2379776.2379782","volume":"45","author":"B Danev","year":"2012","unstructured":"Danev, B., Zanetti, D., Capkun, S.: On physical-layer identification of wireless devices. ACM Comput. Surv. (CSUR) 45(1), 6 (2012)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"2_CR8","unstructured":"Daniels, T.E., Mina, M., Russell, S.F.: A signal fingerprinting paradigm for physical layer security in conventional and sensor networks. In: Proceedings of the International Conference on Security and Privacy for Emerging Areas in Communnication Networks (SecureComm), pp. 219\u2013221. IEEE Computer Society (2005)"},{"key":"2_CR9","unstructured":"Edman, M., Yener, B.: Active attacks against modulation-based radiometric identification. Technical report, Rensselaer Polytechnic Institute, Department of Computer Science (2009), technical Report"},{"key":"2_CR10","unstructured":"Erbskorn, J.W.: Detection of Intrusions at Layer ONe: The IEEE 802.3 normal link pulse as a means of host-to-network authentication A preliminary performance analysis and survey of environmental effects. Master\u2019s thesis, Iowa State University, Ames, IA (2009)"},{"issue":"4","key":"2_CR11","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/TIFS.2012.2197746","volume":"7","author":"R Gerdes","year":"2012","unstructured":"Gerdes, R., Mina, M., Russell, S., Daniels, T.: Physical-layer identification of wired ethernet devices. IEEE Trans. Inf. Forensics Secur. 7(4), 1339\u20131353 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR12","unstructured":"Gerdes, R.M.: Physical layer identification: methodology, security, and origin of variation. Ph.D. thesis, Iowa State University, Ames, IA (2011)"},{"key":"2_CR13","unstructured":"Gerdes, R.M., Daniels, T.E., Mina, M., Russell, S.F.: Device identification via analog signal fingerprinting: a matched filter approach. In: Proceedings of the Network and Distributed System Security Symposium (NDSS). The Internet Society (2006)"},{"key":"2_CR14","unstructured":"Greene, M., Parker, M.: Method and system for detecting a keylogger that encrypts data captured on a computer, 25 July 2006, US Patent App. 11\/492,581"},{"key":"2_CR15","unstructured":"IEEE: Standard for transitions, pulses, and related waveforms (2011), IEEE Std 181\u20132011"},{"key":"2_CR16","unstructured":"Karim, N., Agrawal, A.: Plastic packages electrical performance: reduced bond wire diameter. In: NEPCON WEST, pp. 975\u2013980 (1998)"},{"key":"2_CR17","unstructured":"KeeLog: Open source DIY hardware keylogger (2012). \n                      http:\/\/www.keelog.com\/diy.html"},{"key":"2_CR18","unstructured":"KeeLog: Keygrabber Module (2013). \n                      http:\/\/www.keelog.com\/"},{"key":"2_CR19","unstructured":"KeyCarbon: Keycarbon Raptor (2012). \n                      http:\/\/www.keycarbon.com\/"},{"key":"2_CR20","unstructured":"KeyCarbon: Keycarbon PCI (2013). \n                      http:\/\/www.keycarbon.com\/"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"52","author":"S Kullback","year":"1951","unstructured":"Kullback, S., Leibler, R.A.: On information and sufficiency. Ann. Math. Stat. 52, 79\u201386 (1951)","journal-title":"Ann. Math. Stat."},{"key":"2_CR22","unstructured":"Linear Technology: LT1793 JFET Input Op Amp (1999), datasheet"},{"key":"2_CR23","unstructured":"Linear Technology: LTC2251\/LTC2250 ADCs (2005), datasheet"},{"key":"2_CR24","unstructured":"Mihailowitsch, F.: Detecting hardware keyloggers, November 2010. \n                      https:\/\/deepsec.net\/docs\/Slides\/2010\/DeepSec_2010_Detecting_Hardware_Keylogger.pdf\n                      \n                    . [DeepSec 2010 Presentation]"},{"key":"2_CR25","unstructured":"Nakra, B.C., Chaudhry, K.K.: Instrumentation Measurement and Analysis. McGraw-Hill Education (India) Pvt Limited (2009)"},{"key":"2_CR26","volume-title":"Electric Circuits","author":"JW Nilsson","year":"2010","unstructured":"Nilsson, J.W., Riedel, S.: Electric Circuits. Prentice Hall, Upper Saddle River (2010)"},{"key":"2_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-540-88690-7_37","volume-title":"Computer Vision \u2013 ECCV 2008","author":"O Pele","year":"2008","unstructured":"Pele, O., Werman, M.: A linear time histogram metric for improved SIFT matching. In: Forsyth, D., Torr, P., Zisserman, A. (eds.) ECCV 2008, Part III. LNCS, vol. 5304, pp. 495\u2013508. Springer, Heidelberg (2008)"},{"key":"2_CR28","doi-asserted-by":"publisher","DOI":"10.4135\/9781412961288","volume-title":"Encyclopedia of Research Design","author":"N Salkind","year":"2010","unstructured":"Salkind, N.: Encyclopedia of Research Design. SAGE Publications, Thousand Oaks (2010)"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Sapra, K., Husain, B., Brooks, R., Smith, M.: Circumventing keyloggers and screendumps. In: 2013 8th International Conference on Malicious and Unwanted Software: \u201cThe Americas\u201d (MALWARE), pp. 103\u2013108, October 2013","DOI":"10.1109\/MALWARE.2013.6703691"},{"key":"2_CR30","unstructured":"Texas Instruments: High Speed Analog Design and Application Seminar: High Speed PCB Layout Techniques (2004), presentation"},{"key":"2_CR31","unstructured":"Texas Instruments: LM35 Temperature Sensors (2013), datasheet"},{"key":"2_CR32","unstructured":"Texas Instruments: Tiva TM4C123GH6PM microcontroller (2013), datasheet"},{"key":"2_CR33","unstructured":"Texas Instruments: Use conditions for 5-v tolerant gpios on Tiva C series TM4C123x microcontrollers (2013), application Report"},{"key":"2_CR34","unstructured":"The New York Times: Credit card data breach at Barnes & Noble stores (2012). \n                      http:\/\/www.nytimes.com\/2012\/10\/24\/business\/hackers-get-credit-data-at-barnes-noble.html?_r=3&"},{"issue":"10","key":"2_CR35","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/S1353-4858(10)70126-4","volume":"2010","author":"O Zaitsev","year":"2010","unstructured":"Zaitsev, O.: Skeleton keys: the purpose and applications of keyloggers. Netw. Secur. 2010(10), 12\u201317 (2010)","journal-title":"Netw. Secur."}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26362-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T05:32:49Z","timestamp":1559280769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26362-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319263618","9783319263625"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26362-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}