{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:46:04Z","timestamp":1773330364570,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T00:00:00Z","timestamp":1584144000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T00:00:00Z","timestamp":1584144000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1651273"],"award-info":[{"award-number":["1651273"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1740962"],"award-info":[{"award-number":["1740962"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2540"],"award-info":[{"award-number":["N00014-17-1-2540"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s41635-020-00093-y","type":"journal-article","created":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T15:02:30Z","timestamp":1584198150000},"page":"150-165","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["A Comparison of Backscattering, EM, and Power Side-Channels and Their Performance in Detecting Software and Hardware Intrusions"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8555-4376","authenticated-orcid":false,"given":"Luong N.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Chia-Lin","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Frank T.","family":"Werner","sequence":"additional","affiliation":[]},{"given":"Milos","family":"Prvulovic","sequence":"additional","affiliation":[]},{"given":"Alenka","family":"Zajic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,14]]},"reference":[{"key":"93_CR1","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis: leaking secrets. In: Proceedings of CRYPTO\u201999, Springer, Lecture notes in computer science, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"93_CR2","doi-asserted-by":"crossref","unstructured":"Bayrak AG, Regazzoni F, Brisk P, Standaert F-X, Ienne P (2011) A first step towards automatic application of power analysis countermeasures. In: Proceedings of the 48th Design Automation Conference (DAC)","DOI":"10.1145\/2024724.2024778"},{"key":"93_CR3","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair U, Xu X, S\u00f6lter J, Mahmoud A, Majzoobi M, Koushanfar F, Burleson W (2014) Efficient power and timing side channels for physical unclonable functions. In: International Workshop on Cryptographic Hardware and Embedded Systems, Springer, pp 476\u2013492","DOI":"10.1007\/978-3-662-44709-3_26"},{"key":"93_CR4","unstructured":"Backes M, Durmuth M, Gerling S, Pinkal M, Sporleder C (2010) Acoustic side-channel attacks on printers. In: Proceedings of the USENIX Security Symposium"},{"key":"93_CR5","unstructured":"Chari S, Rao JR, Rohatgi P (2002) Template attacks. In: Proceedings of Cryptographic Hardware and Embedded Systems \u2013 CHES 2002, pp 13\u201328"},{"key":"93_CR6","unstructured":"Agrawal D, Archambeult B, Rao JR, Rohatgi P (2002) The EM side-channel(s). In: Proceedings of Cryptographic Hardware and Embedded Systems \u2013 CHES 2002, pp 29\u201345"},{"issue":"2","key":"93_CR7","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s13389-015-0100-7","volume":"5","author":"D Genkin","year":"2015","unstructured":"Genkin D, Pipman I, Tromer E (2015) Get your hands off my laptop: physical side-channel key-extraction attacks on pcs. J Cryptogr Eng 5(2):95\u2013112","journal-title":"J Cryptogr Eng"},{"key":"93_CR8","unstructured":"Alam M, Khan HA, Dey M, Sinha N, Callan RL, Zajic AG, Prvulovic M (2018) One&done: a single-decryption EM-based attack on OpenSSL\u2019s constant-time blinded RSA. In: USENIX Security, pp 585\u2013602"},{"issue":"3","key":"93_CR9","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1109\/TEMC.2012.2232297","volume":"55","author":"H Sekiguchi","year":"2013","unstructured":"Sekiguchi H, Seto S (2013) Study on maximum receivable distance for radiated emission of information technology equipment causing information leakage. IEEE Trans Electromagn Compat 55(3):547\u2013554","journal-title":"IEEE Trans Electromagn Compat"},{"issue":"3","key":"93_CR10","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/TEMC.2012.2222890","volume":"55","author":"Y Hayashi","year":"2013","unstructured":"Hayashi Y, Homma N, Mizuki T, Shimada H, Aoki T, Sone H, Sauvage L, Danger J-L (2013) Efficient evaluation of em radiation associated with information leakage from cryptographic devices. IEEE Trans Electromagn Compat 55(3):555\u2013563","journal-title":"IEEE Trans Electromagn Compat"},{"key":"93_CR11","doi-asserted-by":"crossref","unstructured":"Gandolfi K, Mourtel C, Olivier F (2001) Electromagnetic analysis: concrete results. In: Proceedings of Cryptographic Hardware and Embedded Systems \u2013 CHES 2001, pp 251\u2013261","DOI":"10.1007\/3-540-44709-1_21"},{"key":"93_CR12","doi-asserted-by":"crossref","unstructured":"Vuagnoux M, Pasini S (2010) An improved technique to discover compromising electromagnetic emanations. In: 2010 IEEE International Symposium on Electromagnetic Compatibility, pp 121\u2013126","DOI":"10.1109\/ISEMC.2010.5711257"},{"issue":"3","key":"93_CR13","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1109\/TEMC.2012.2227486","volume":"55","author":"YI Hayashi","year":"2013","unstructured":"Hayashi YI, Homma N, Mizuki T, Aoki T, Sone H, Sauvage L, Danger JL (2013) Analysis of electromagnetic information leakage from cryptographic devices with different physical structures. IEEE Trans Electromagn Compat 55(3):571\u2013 580","journal-title":"IEEE Trans Electromagn Compat"},{"key":"93_CR14","doi-asserted-by":"crossref","unstructured":"Callan R, Zajic A, Prvulovic M (2014) A practical methodology for measuring the side-channel signal available to the attacker for instruction-level events. In: 2014 47th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO), IEEE, pp 242\u2013254","DOI":"10.1109\/MICRO.2014.39"},{"issue":"3","key":"93_CR15","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1109\/TIFS.2017.2762826","volume":"13","author":"BB Yilmaz","year":"2017","unstructured":"Yilmaz BB, Callan RL, Prvulovic M, Zaji\u0107 A (2017) Capacity of the em covert\/side-channel created by the execution of instructions in a processor. IEEE Trans Inf Foren Sec 13(3):605\u2013 620","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"93_CR16","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIFS.2019.2929018","volume":"15","author":"BB Yilmaz","year":"2019","unstructured":"Yilmaz BB, Prvulovic M, Zaji\u0107 A (2019) Electromagnetic side channel information leakage created by execution of series of instructions in a computer processor. IEEE Trans Inf Foren Sec 15:776\u2013789","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"93_CR17","doi-asserted-by":"crossref","unstructured":"Yilmaz BB, Sehatbakhsh N, Zaji\u0107 A, Prvulovic M (2019) Communication model and capacity limits of covert channels created by software activities. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2019.2952265"},{"key":"93_CR18","doi-asserted-by":"crossref","unstructured":"Liu L, Yan G, Zhang X, Chen S (2009) Virusmeter: Preventing your cellphone from spies. In: International Workshop on Recent Advances in Intrusion Detection, Springer, pp 244\u2013264","DOI":"10.1007\/978-3-642-04342-0_13"},{"issue":"2-3","key":"93_CR19","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s10470-011-9777-4","volume":"69","author":"CRA Gonz\u00e1lez","year":"2011","unstructured":"Gonz\u00e1lez CRA, Reed JH (2011) Power fingerprinting in sdr integrity assessment for security and regulatory compliance. Analog Integr Circ Sig Process 69(2-3):307","journal-title":"Analog Integr Circ Sig Process"},{"key":"93_CR20","unstructured":"Clark SS, Ransford B, Rahmati A, Guineau S, Sorber J, Xu W, Fu K (2013) Wattsupdoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices. In: HealthTech"},{"key":"93_CR21","doi-asserted-by":"crossref","unstructured":"Callan R, Behrang F, Zajic A, Prvulovic M, Orso A (2016) Zero-overhead profiling via em emanations. In: Proceedings of the 25th International Symposium on Software Testing and Analysis, ACM, pp 401\u2013412","DOI":"10.1145\/2931037.2931065"},{"key":"93_CR22","doi-asserted-by":"crossref","unstructured":"Nazari A, Sehatbakhsh N, Alam M, Zajic A, Prvulovic M (2017) Eddie: Em-based detection of deviations in program execution. In: Proceedings of the 44th Annual International Symposium on Computer Architecture, ser. ISCA \u201917, pp 333\u2013346","DOI":"10.1145\/3079856.3080223"},{"key":"93_CR23","doi-asserted-by":"crossref","unstructured":"Khan HA, Sehatbakhsh N, Nguyen LN, Callan R, Yeredor A, Prvulovic M, Zaji\u0107 A (2019) Idea: Intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems. IEEE Transactions on Dependable and Secure Computing (to be published)","DOI":"10.1109\/TDSC.2019.2932736"},{"key":"93_CR24","doi-asserted-by":"crossref","unstructured":"Khan HA, Sehatbakhsh N, Nguyen LN, Prvulovic M, Zaji\u0107 A (2019) Malware detection in embedded systems using neural network model for electromagnetic side-channel signals. Journal of Hardware and Systems Security (to be published)","DOI":"10.1007\/s41635-019-00074-w"},{"key":"93_CR25","doi-asserted-by":"crossref","unstructured":"Callan R, Zaji\u0107 A, Prvulovic M (2015) Fase: Finding amplitude-modulated side-channel emanations. In: ACM SIGARCH Computer Architecture News, vol 43, no 3. ACM, pp 592\u2013603","DOI":"10.1145\/2749469.2750394"},{"key":"93_CR26","doi-asserted-by":"crossref","unstructured":"Yilmaz BB, Ugurlu EM, Zajic A, Prvulovic M (2019) Instruction level program tracking using electromagnetic emanations. In: Proceedings of the SPIE, vol 11011. International Society for Optics and Photonics","DOI":"10.1117\/12.2522620"},{"key":"93_CR27","doi-asserted-by":"crossref","unstructured":"Sehatbakhsh N, Nazari A, Zajic A, Prvulovic M (2016) Spectral profiling: observer-effect-free profiling by monitoring em emanations. In: 2016 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO), pp 1\u201311","DOI":"10.1109\/MICRO.2016.7783762"},{"key":"93_CR28","unstructured":"Khan HA, Alam M, Zajic A, Prvulovic M (2018) Detailed tracking of program control flow using analog side-channel signals: a promise for iot malware detection and a threat for many cryptographic implementations. In: Cyber Sensing 2018, vol 10630. International Society for Optics and Photonics, p 1063005"},{"key":"93_CR29","doi-asserted-by":"crossref","unstructured":"Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test Comput 27(1)","DOI":"10.1109\/MDT.2010.7"},{"key":"93_CR30","doi-asserted-by":"crossref","unstructured":"Sehatbakhsh N, Alam M, Nazari A, Zajic A, Prvulovic M (2018) Syndrome: spectral analysis for anomaly detection on medical iot and embedded devices. In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, pp 1\u20138","DOI":"10.1109\/HST.2018.8383884"},{"key":"93_CR31","doi-asserted-by":"crossref","unstructured":"Dey M, Nazari A, Zajic A, Prvulovic M (2018) Emprof: Memory profiling via em-emanation in iot and hand-held devices. In: 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO), IEEE, pp 881\u2013893","DOI":"10.1109\/MICRO.2018.00076"},{"key":"93_CR32","doi-asserted-by":"crossref","unstructured":"Sehatbakhsh N, Nazari A, Khan H, Zajic A, Prvulovic M (2019) Emma: Hardware\/software attestation framework for embedded systems using electromagnetic signals. In: Proceedings of the 52nd Annual IEEE\/ACM International Symposium on Microarchitecture, pp 983\u2013995","DOI":"10.1145\/3352460.3358261"},{"key":"93_CR33","doi-asserted-by":"crossref","unstructured":"Sehatbakhsh N, Nazari A, Alam M, Werner F, Zhu Y, Zajic A, Prvulovic M (2019) Remote: robust external malware detection framework by using electromagnetic signals. IEEE Transactions on Computers","DOI":"10.1109\/TC.2019.2945767"},{"key":"93_CR34","doi-asserted-by":"crossref","unstructured":"Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using ic fingerprinting. In: IEEE Symposium on Security and Privacy, 2007. SP\u201907, IEEE, pp 296\u2013310","DOI":"10.1109\/SP.2007.36"},{"key":"93_CR35","doi-asserted-by":"crossref","unstructured":"Banga M, Hsiao MS (2008) A region based approach for the identification of hardware trojans. In: IEEE International Workshop on Hardware-Oriented Security and Trust, 2008. HOST 2008, IEEE, pp 40\u201347","DOI":"10.1109\/HST.2008.4559047"},{"key":"93_CR36","doi-asserted-by":"crossref","unstructured":"He C, Hou B, Wang L, En Y, Xie S (2015) A failure physics model for hardware trojan detection based on frequency spectrum analysis. In: 2015 IEEE International Reliability Physics Symposium (IRPS), IEEE, pp PR\u20131","DOI":"10.1109\/IRPS.2015.7112822"},{"key":"93_CR37","doi-asserted-by":"crossref","unstructured":"Banga M, Hsiao MS (2009) Vitamin: voltage inversion technique to ascertain malicious insertions in ics. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, IEEE, pp 104\u2013107","DOI":"10.1109\/HST.2009.5224960"},{"key":"93_CR38","doi-asserted-by":"crossref","unstructured":"Narasimhan S, Du D, Chakraborty RS, Paul S, Wolff F, Papachristou C, Roy K, Bhunia S (2010) Multiple-parameter side-channel analysis: a non-invasive hardware trojan detection approach. In: 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), IEEE, PP 13\u201318","DOI":"10.1109\/HST.2010.5513122"},{"issue":"10","key":"93_CR39","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1109\/TCAD.2015.2424929","volume":"34","author":"C Bao","year":"2015","unstructured":"Bao C, Forte D, Srivastava A (2015) Temperature tracking: toward robust run-time detection of hardware trojans. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34(10):1577\u20131585","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"93_CR40","doi-asserted-by":"crossref","unstructured":"Forte D, Bao C, Srivastava A (2013) Temperature tracking: an innovative run-time approach for hardware trojan detection. In: Proceedings of the International Conference on Computer-Aided Design, IEEE Press, pp 532\u2013539","DOI":"10.1109\/ICCAD.2013.6691167"},{"issue":"10","key":"93_CR41","doi-asserted-by":"publisher","first-page":"2939","DOI":"10.1109\/TVLSI.2017.2727985","volume":"25","author":"J He","year":"2017","unstructured":"He J, Zhao Y, Guo X, Jin Y (2017) Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25(10):2939\u20132948","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"93_CR42","doi-asserted-by":"crossref","unstructured":"Balasch J, Gierlichs B, Verbauwhede I (2015) Electromagnetic circuit fingerprints for hardware trojan detection. In: 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC), IEEE, pp 246\u2013251","DOI":"10.1109\/ISEMC.2015.7256167"},{"issue":"3","key":"93_CR43","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s13389-016-0129-2","volume":"6","author":"XT Ngo","year":"2016","unstructured":"Ngo XT, Najm Z, Bhasin S, Guilley S, Danger J-L (2016) Method taking into account process dispersion to detect hardware trojan horse by side-channel analysis. J Cryptogr Eng 6(3):239\u2013247","journal-title":"J Cryptogr Eng"},{"key":"93_CR44","doi-asserted-by":"crossref","unstructured":"Hu K, Nowroz AN, Reda S, Koushanfar F (2013) High-sensitivity hardware trojan detection using multimodal characterization. In: Proceedings of the Conference on Design, Automation and Test in Europe, EDA Consortium, pp 1271\u20131276","DOI":"10.7873\/DATE.2013.263"},{"issue":"12","key":"93_CR45","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/TCAD.2014.2354293","volume":"33","author":"AN Nowroz","year":"2014","unstructured":"Nowroz AN, Hu K, Koushanfar F, Reda S (2014) Novel techniques for high-sensitivity hardware trojan detection using thermal and power maps. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 33(12):1792\u20131805","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"issue":"7","key":"93_CR46","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1109\/TVLSI.2019.2906547","volume":"27","author":"LN Nguyen","year":"2019","unstructured":"Nguyen LN, Cheng C, Prvulovic M, Zajic A (2019) Creating a backscattering side channel to enable detection of dormant hardware trojans. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27(7):1561\u20131574","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"93_CR47","unstructured":"Rabaey JM, Chandrakasan AP, Nikolic B (2002) Digital integrated circuits. Prentice hall Englewood Cliffs, vol 2"},{"key":"93_CR48","unstructured":"[Online]. Available: http:\/\/www.aaronia.com\/products\/antennas\/Near-Field-Probe-Set-PBS2"},{"key":"93_CR49","unstructured":"Agrawal D, Archambeault B, Rao JR, Rohatgi P (2002) The em side channel (s). In: International Workshop on Cryptographic Hardware and Embedded Systems, Springer, pp 29\u201345"},{"key":"93_CR50","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual International Cryptology Conference, Springer, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"93_CR51","unstructured":"[Online]. Available: http:\/\/www.keysight.com\/en\/pd-2471132-pn-N7020A\/"},{"key":"93_CR52","unstructured":"[Online]. Available: https:\/\/www.com-power.com\/ah118_horn_antenna.html"},{"key":"93_CR53","doi-asserted-by":"crossref","unstructured":"Guthaus MR, Pingenberg JS, Emst D, Austin TM, Mudge T, Brown RB (2001) Mibench: a free, commercially representative embedded benchmark suite. In: Proceedings of the Workload Characterization, 2001. WWC-4. 2001 IEEE International Workshop, ser WWC \u201901","DOI":"10.1109\/WWC.2001.990739"},{"key":"93_CR54","unstructured":"\u201cTrusthub,\u201d http:\/\/www.trust-hub.org\/benchmarks\/trojan"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-020-00093-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-020-00093-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-020-00093-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,14]],"date-time":"2021-03-14T00:45:41Z","timestamp":1615682741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-020-00093-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,14]]},"references-count":54,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["93"],"URL":"https:\/\/doi.org\/10.1007\/s41635-020-00093-y","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"value":"2509-3428","type":"print"},{"value":"2509-3436","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,14]]},"assertion":[{"value":"28 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The views and findings expressed in this paper are those of the authors and do not necessarily reflect the views of NSF, DARPA, and ONR.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclaimer"}}]}}