{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:06:55Z","timestamp":1739423215541,"version":"3.37.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00927-8","type":"journal-article","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:42:30Z","timestamp":1730302950000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device"],"prefix":"10.1007","volume":"24","author":[{"given":"Pablo","family":"Perez-Tirador","sequence":"first","affiliation":[]},{"given":"Madhav","family":"Desai","sequence":"additional","affiliation":[]},{"given":"Alejandro","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Berral","sequence":"additional","affiliation":[]},{"given":"Teresa","family":"Romero","sequence":"additional","affiliation":[]},{"given":"Gabriel","family":"Caffarena","sequence":"additional","affiliation":[]},{"given":"Ruzica","family":"Jevtic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,30]]},"reference":[{"key":"927_CR1","unstructured":"Cost of a Data Breach Report 2023. IBM Corporation (2023)"},{"key":"927_CR2","doi-asserted-by":"publisher","unstructured":"Sehatbakhsh, N., Yilmaz, B., Zajic, A., Prvulovic, M.: A new side-channel vulnerability on modern computers by exploiting electromagnetic emanations from the power management unit. In: In Proc. on IEEE Int. Symp. On high-performance computer architecture (HPCA) (2020). https:\/\/doi.org\/10.1109\/HPCA47549.2020.00020","DOI":"10.1109\/HPCA47549.2020.00020"},{"key":"927_CR3","doi-asserted-by":"publisher","unstructured":"Camurati, G., Poeplau, S., Muench, M., Hayes, T., Francillon, A.: Screaming channels: When electromagnetic side channels meet radio transceivers. In: In Proc. 2018 ACM SIGSAC conference on computer and communications security (2018). https:\/\/doi.org\/10.1145\/3243734.3243802","DOI":"10.1145\/3243734.3243802"},{"key":"927_CR4","doi-asserted-by":"publisher","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power analysis attacks: Revealing the secrets of smart cards, vol.\u00a031. Springer Science & Business Media (2008). https:\/\/doi.org\/10.1007\/978-0-387-38162-6","DOI":"10.1007\/978-0-387-38162-6"},{"key":"927_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870663","author":"R Xu","year":"2018","unstructured":"Xu, R., Zhu, L., Wang, A., Du, X., Choo, K., Zhang, G., Gai, K.: Side-channel attack on a protected rfid card. IEEE Access (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2870663","journal-title":"IEEE Access"},{"key":"927_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-015-0100-7","author":"D Genkin","year":"2015","unstructured":"Genkin, D., Pipman, I., Tromer, E.: Get your hands off my laptop: physical side-channel key-extraction attacks on pcs: extended version. J. Cryptogr. Eng. (2015). https:\/\/doi.org\/10.1007\/s13389-015-0100-7","journal-title":"J. Cryptogr. Eng."},{"key":"927_CR7","doi-asserted-by":"publisher","unstructured":"Oswald, E., Mangard, S., Pramstaller, N., Rijmen, V.: A side-channel analysis resistant description of the AES S-Box. In: H.\u00a0Gilbert, H.\u00a0Handschuh (eds.) Fast Software Encryption. FSE 2005. Lecture Notes in Computer Science. Springer International Publishing (2005). https:\/\/doi.org\/10.1007\/11502760_28","DOI":"10.1007\/11502760_28"},{"key":"927_CR8","doi-asserted-by":"publisher","unstructured":"Banerjee, U., Ho, L., Koppula, S.: Power-based side-channel attack for AES key extraction on the ATMega328 microcontroller. arXiv (2022). https:\/\/doi.org\/10.48550\/arXiv.2203.08220","DOI":"10.48550\/arXiv.2203.08220"},{"key":"927_CR9","doi-asserted-by":"publisher","unstructured":"Jevtic, R., Perez-Tirador, P., Cabezaolias, C., Carnero, P., Caffarena, G.: Side-channel attack countermeasure based on power supply modulation. In: 2022 30th European Signal Processing Conference (EUSIPCO), pp. 618\u2013622 (2022). https:\/\/doi.org\/10.23919\/EUSIPCO55093.2022.9909766","DOI":"10.23919\/EUSIPCO55093.2022.9909766"},{"issue":"2","key":"927_CR10","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/JSSC.2018.2875112","volume":"54","author":"A Singh","year":"2019","unstructured":"Singh, A., Kar, M., Mathew, S., Rajan, A., De, V., Mukhopadhyay, S.: Improved power\/EM side-channel attack resistance of 128-bit AES engines with random fast voltage dithering. IEEE J. Solid-State Circuits 54(2), 569\u2013583 (2019). https:\/\/doi.org\/10.1109\/JSSC.2018.2875112","journal-title":"IEEE J. Solid-State Circuits"},{"key":"927_CR11","doi-asserted-by":"publisher","unstructured":"Utyamishev, D., Partin-Vaisband, I.: Real-time detection of power analysis attacks by machine learning of power supply variations on-chip. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. (2018). https:\/\/doi.org\/10.1109\/TCAD.2018.2883971","DOI":"10.1109\/TCAD.2018.2883971"},{"key":"927_CR12","doi-asserted-by":"publisher","unstructured":"Gattu, N., Imtiaz\u00a0Khan, M.N., De, A., Ghosh, S.: Power side channel attack analysis and detection. In: IEEE\/ACM international conference on computer aided design (ICCAD), pp. 1\u20137 (2020). https:\/\/doi.org\/10.1145\/3400302.3415692","DOI":"10.1145\/3400302.3415692"},{"issue":"6","key":"927_CR13","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1080\/17434440.2018.1483235","volume":"15","author":"L Pycroft","year":"2018","unstructured":"Pycroft, L., Aziz, T.: Security of implantable medical devices with wireless connections: the dangers of cyber-attacks. Expert Rev. Med. Devices 15(6), 403\u2013406 (2018). https:\/\/doi.org\/10.1080\/17434440.2018.1483235","journal-title":"Expert Rev. Med. Devices"},{"key":"927_CR14","doi-asserted-by":"publisher","unstructured":"Liu, J., Homayoun, H., Fang, C., Miao, N., Wang, H.: Side channel-assisted inference attacks on machine learning-based ECG classification. In: 2023 IEEE\/ACM Int. Conf. computer aided design (ICCAD), pp. 1\u20139 (2023). https:\/\/doi.org\/10.1109\/ICCAD57390.2023.10323617","DOI":"10.1109\/ICCAD57390.2023.10323617"},{"key":"927_CR15","unstructured":"ICS medical advisory (icsma-19-080-01), \u201cMedtronic Conexus radio frequency telemetry protocol\u201d (update C), cybersecurity and infrastructure security agency (2021)"},{"key":"927_CR16","doi-asserted-by":"publisher","unstructured":"Kune, D., Backes, J., Clark, S., Kramer, D., Reynolds, M., Fu, K., Kim, Y., Xu, W.: Ghost talk: Mitigating EMI signal injection attacks against analog sensors. In: 2013 IEEE Symposium on Security and Privacy, pp. 145\u2013159 (2013). https:\/\/doi.org\/10.1109\/SP.2013.20","DOI":"10.1109\/SP.2013.20"},{"issue":"1","key":"927_CR17","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/COMST.2019.2952858","volume":"22","author":"I Giechaskiel","year":"2020","unstructured":"Giechaskiel, I., Rasmussen, K.: Taxonomy and challenges of out-of-band signal injection attacks and defenses. IEEE Commun. Surv. Tutor. 22(1), 645\u2013670 (2020). https:\/\/doi.org\/10.1109\/COMST.2019.2952858","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"927_CR18","doi-asserted-by":"publisher","unstructured":"Kim, Y., Lee, W., Raghunathan, V., Jha, N., Raghunathan, A.: Vibration-based secure side channel for medical devices. In: Proc. 52nd Annual Design Automation Conference, DAC \u201915. Association for Computing Machinery, New York, NY, USA (2015). https:\/\/doi.org\/10.1145\/2744769.2744928","DOI":"10.1145\/2744769.2744928"},{"key":"927_CR19","unstructured":"Di\u00a0Cesare, M., et\u00a0al.: World Heart Report 2023: Confronting the World\u2019s Number One Killer. World Heart Federation (2023)"},{"key":"927_CR20","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10192324","author":"M Desai","year":"2021","unstructured":"Desai, M., Caffarena, G., Jevtic, R., M\u00e1rquez, D., Otero, A.: A low-latency, low-power FPGA implementation of ECG signal characterization using Hermite polynomials. Electronics (2021). https:\/\/doi.org\/10.3390\/electronics10192324","journal-title":"Electronics"},{"key":"927_CR21","doi-asserted-by":"publisher","unstructured":"Lakhotia, K., Caffarena, G., Gil, A., M\u00e1rquez, D., Otero, A., Desai, M.: Low-power, low-latency Hermite polynomial characterization of heartbeats using a field-programmable gate array. In: F.\u00a0Ortu\u00f1o, I.\u00a0Rojas (eds.) Bioinformatics and Biomedical Eng., pp. 266\u2013276. Springer International Publishing (2016). https:\/\/doi.org\/10.1007\/978-3-319-31744-1_24","DOI":"10.1007\/978-3-319-31744-1_24"},{"issue":"7","key":"927_CR22","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/TCSII.2017.2747596","volume":"65","author":"Z Chen","year":"2018","unstructured":"Chen, Z., Luo, J., Lin, K., Wu, J., Zhu, T., Xiang, X., Meng, J.: An energy-efficient ECG processor with weak-strong hybrid classifier for arrhythmia detection. IEEE Trans. Circuits Syst. II: Express Briefs 65(7), 948\u2013952 (2018). https:\/\/doi.org\/10.1109\/TCSII.2017.2747596","journal-title":"IEEE Trans. Circuits Syst. II: Express Briefs"},{"key":"927_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2021.3058781","author":"C Bock","year":"2021","unstructured":"Bock, C., Kovacs, P., Laguna, P., Meier, J., Huemer, M.: Ecg beat representation and delineation by means of variable projection. IEEE Trans. Biomed. Eng. (2021). https:\/\/doi.org\/10.1109\/TBME.2021.3058781","journal-title":"IEEE Trans. Biomed. Eng."},{"key":"927_CR24","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-84374-8","author":"K Weimann","year":"2020","unstructured":"Weimann, K., Conrad, T.: Transfer learning for ECG classification. Scientific Rep. (2020). https:\/\/doi.org\/10.1038\/s41598-021-84374-8","journal-title":"Scientific Rep."},{"key":"927_CR25","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-97118-5","author":"S Aziz","year":"2021","unstructured":"Aziz, S., Ahmed, S., Alouini, M.: ECG-based machine-learning algorithms for heartbeat classification. Scientific Rep. (2021). https:\/\/doi.org\/10.1038\/s41598-021-97118-5","journal-title":"Scientific Rep."},{"key":"927_CR26","doi-asserted-by":"crossref","unstructured":"Kov\u00e1cs, P., Fridli, S., Schipp, F.: Generalized rational variable projection with application in ecg compression. IEEE Trans. Signal Processing 68 (2020). https:\/\/doi.org\/1109\/TSP.2019.2961234","DOI":"10.1109\/TSP.2019.2961234"},{"key":"927_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/10.846677","author":"M Lagerholm","year":"2000","unstructured":"Lagerholm, M., Peterson, C., Braccini, G., Edenbrandt, L., Sornmo, L.: Clustering ECG complexes using Hermite functions and self-organizing maps. IEEE Trans. Biomed. Eng. (2000). https:\/\/doi.org\/10.1109\/10.846677","journal-title":"IEEE Trans. Biomed. Eng."},{"key":"927_CR28","doi-asserted-by":"publisher","unstructured":"Haraldsson, H., Edenbrandt, L., M., O.: Detecting acute myocardial infarction in the 12-lead ecg using hermite expansions and neural networks. Artif .Intell. Med. 32(2) (2004). https:\/\/doi.org\/10.1016\/j.artmed.2004.01.003","DOI":"10.1016\/j.artmed.2004.01.003"},{"issue":"1979","key":"927_CR29","first-page":"37","volume":"6","author":"W Engelse","year":"1979","unstructured":"Engelse, W., Zeelenberg, C.: A single scan algorithm for QRS-detection and feature extraction. Comput. Cardiol. 6(1979), 37\u201342 (1979)","journal-title":"Comput. Cardiol."},{"issue":"1","key":"927_CR30","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.cmpb.2008.07.010","volume":"93","author":"M Adnane","year":"2009","unstructured":"Adnane, M., Jiang, Z., Choi, S.: Development of QRS detection algorithm designed for wearable cardiorespiratory system. Comput. Methods Prog. Biomed. 93(1), 20\u201331 (2009). https:\/\/doi.org\/10.1016\/j.cmpb.2008.07.010","journal-title":"Comput. Methods Prog. Biomed."},{"issue":"3","key":"927_CR31","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1016\/j.cmpb.2011.12.004","volume":"107","author":"Z Zidelmal","year":"2012","unstructured":"Zidelmal, Z., Amirou, A., Adnane, M., Belouchrani, A.: QRS detection based on wavelet coefficients. Comput. Methods Prog. Biomed. 107(3), 490\u2013496 (2012). https:\/\/doi.org\/10.1016\/j.cmpb.2011.12.004","journal-title":"Comput. Methods Prog. Biomed."},{"key":"927_CR32","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s13246-012-0149-x","volume":"35","author":"Y Li","year":"2012","unstructured":"Li, Y., Yan, H., Hong, F., Song, J.: A new approach of QRS complex detection based on matched filtering and triangle character analysis. Australas. phys. Eng. Sci. Med. 35, 341\u2013356 (2012). https:\/\/doi.org\/10.1007\/s13246-012-0149-x","journal-title":"Australas. phys. Eng. Sci. Med."},{"key":"927_CR33","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s10207-018-0403-7","volume":"18","author":"G de Souza Faria","year":"2019","unstructured":"de Souza Faria, G., Kim, H.: Differential audio analysis: a new side-channel attack on PIN pads. Int. J. Inf. Secur. 18, 73\u201384 (2019). https:\/\/doi.org\/10.1007\/s10207-018-0403-7","journal-title":"Int. J. Inf. Secur."},{"key":"927_CR34","doi-asserted-by":"publisher","unstructured":"Sonmez, B., Sarikaya, A., Bahtiyar, S.: Machine learning based side channel selection for time-driven cache attacks on AES. In: 2019 4th International Conference on Computer Science and Engineering (UBMK), pp. 1\u20135 (2019). https:\/\/doi.org\/10.1109\/UBMK.2019.8907211","DOI":"10.1109\/UBMK.2019.8907211"},{"key":"927_CR35","doi-asserted-by":"publisher","unstructured":"Camurati, G., Poeplau, S., Muench, M., Hayes, T., Francillon, A.: Screaming channels. In: Proc. of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM (2018). https:\/\/doi.org\/10.1145\/3243734.3243802","DOI":"10.1145\/3243734.3243802"},{"issue":"3","key":"927_CR36","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/s10207-021-00563-6","volume":"21","author":"A Spence","year":"2022","unstructured":"Spence, A., Bangay, S.: Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures. Int. J. of Inf. Secur. 21(3), 437\u2013453 (2022). https:\/\/doi.org\/10.1007\/s10207-021-00563-6","journal-title":"Int. J. of Inf. Secur."},{"key":"927_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JTEHM.2020.3028996","volume":"8","author":"A Spence","year":"2020","unstructured":"Spence, A., Bangay, S.: Side-channel sensing: Exploiting side-channels to extract information for medical diagnostics and monitoring. IEEE J. Translational Eng. Health Med. 8, 1\u201313 (2020). https:\/\/doi.org\/10.1109\/JTEHM.2020.3028996","journal-title":"IEEE J. Translational Eng. Health Med."},{"issue":"4","key":"927_CR38","doi-asserted-by":"publisher","first-page":"2256","DOI":"10.1109\/TCSII.2022.3144071","volume":"69","author":"R Jevtic","year":"2022","unstructured":"Jevtic, R., Otero, M.: Methodology for complete decorrelation of power supply EM side-channel signal and sensitive data. IEEE Trans. Circuits Syst. II: Express Briefs 69(4), 2256\u20132260 (2022). https:\/\/doi.org\/10.1109\/TCSII.2022.3144071","journal-title":"IEEE Trans. Circuits Syst. II: Express Briefs"},{"key":"927_CR39","doi-asserted-by":"publisher","unstructured":"Jevtic, R., Ylitolva, M., Calonge, C., Ojanen, M., Santti, T., Koskinen, L.: EM side-channel countermeasure for switched-capacitor DC-DC converters based on amplitude modulation. IEEE Trans. Very Large Scale Integration (VLSI) Systems 29(6), 1061\u20131072 (2021). https:\/\/doi.org\/10.1109\/TVLSI.2021.3070687","DOI":"10.1109\/TVLSI.2021.3070687"},{"issue":"5","key":"927_CR40","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1109\/TCSII.2015.2505261","volume":"63","author":"W Yu","year":"2016","unstructured":"Yu, W., K\u00f6se, S.: Charge-withheld converter-reshuffling: a countermeasure against power analysis attacks. IEEE Trans. Circuits Syst. II: Express Briefs 63(5), 438\u2013442 (2016). https:\/\/doi.org\/10.1109\/TCSII.2015.2505261","journal-title":"IEEE Trans. Circuits Syst. II: Express Briefs"},{"key":"927_CR41","doi-asserted-by":"publisher","unstructured":"Kamoun, N., Bossuet, L., Ghazel, A.: Correlated power noise generator as a low cost DPA countermeasures to secure hardware AES cipher. In: 3rd International Conference on Signals, Circuits and Systems (SCS), pp. 1\u20136 (2009). https:\/\/doi.org\/10.1109\/ICSCS.2009.5412604","DOI":"10.1109\/ICSCS.2009.5412604"},{"key":"927_CR42","doi-asserted-by":"publisher","DOI":"10.3390\/jlpea12030048","author":"L Parrilla","year":"2022","unstructured":"Parrilla, L., Garci-a, A., Castillo, E., Rodriguez-Bolivar, S., Lopez-Villanueva, J.: Time- and amplitude-controlled power noise generator against SPA attacks for FPGA-based IoT devices. J. Low Power Electron. Appl. (2022). https:\/\/doi.org\/10.3390\/jlpea12030048","journal-title":"J. Low Power Electron. Appl."},{"key":"927_CR43","unstructured":"Newae Technology Inc.: CW305 Artix FPGA Target. https:\/\/www.newae.com\/products\/nae-cw305. Accessed 22nd February, 2024"},{"key":"927_CR44","unstructured":"Rinta-Aho, T., Karlstedt, M., Desai, M.: The Click2NetFPGA toolchain. In: 2012 USENIX Annual Technical Conference (USENIX ATC 12), pp. 77\u201388. USENIX Association, Boston, MA (2012)"},{"key":"927_CR45","unstructured":"Pololu USB-to-serial adapter. https:\/\/www.pololu.com\/product\/391. Accessed 22nd February, 2024"},{"issue":"3","key":"927_CR46","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/51.932724","volume":"20","author":"G Moody","year":"2001","unstructured":"Moody, G., Mark, R.: The impact of the MIT-BIH arrhythmia database. IEEE Eng. Med. Biol. Magazine 20(3), 45\u201350 (2001). https:\/\/doi.org\/10.1109\/51.932724","journal-title":"IEEE Eng. Med. Biol. Magazine"},{"key":"927_CR47","unstructured":"Texas Instruments TPS56520. https:\/\/www.ti.com\/product\/TPS56520. Accessed 9th July, 2024"},{"key":"927_CR48","unstructured":"Microchip Technology ATSAM3U2E. https:\/\/www.microchip.com\/en-us\/product\/ATSAM3U2E. Accessed 9th July, 2024"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00927-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00927-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00927-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:19:20Z","timestamp":1739337560000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00927-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,30]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["927"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00927-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2024,10,30]]},"assertion":[{"value":"30 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"8"}}