{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:37:12Z","timestamp":1740101832703,"version":"3.37.3"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/host55118.2023.10133158","type":"proceedings-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:29:36Z","timestamp":1685035776000},"page":"203-214","source":"Crossref","is-referenced-by-count":0,"title":["MagHop: Magnetic Spectrum Hopping for Securing Voltage and Current Magnetic Sensors"],"prefix":"10.1109","author":[{"given":"Anomadarshi","family":"Barua","sequence":"first","affiliation":[{"name":"University of California,Department of Electrical Engineering and Computer Science,Irvine"}]},{"given":"Mohammad Abdullah Al","family":"Faruque","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical Engineering and Computer Science,Irvine"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453097"},{"key":"ref15","article-title":"Electric Machines: Theory, Operation, Applications, Ad-justment & Control","author":"hubert","year":"2009","journal-title":"Pearson Education"},{"key":"ref14","article-title":"Engineering Electromag-netics---(SIE)","author":"hayt","year":"2020","journal-title":"McGraw-Hill Ed"},{"key":"ref53","article-title":"Challenges for securing cyber physical systems","volume":"5","author":"cardenas","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"ref55","first-page":"3804","article-title":"Secure state reconstruction in differentially flat at systems under sensor attacks using satisfability modulo theory solving","author":"s","year":"2015","journal-title":"2015 54th IEEE Conference on Decision and Control (CDC) IEEE"},{"key":"ref10","first-page":"3","article-title":"Walnut: Waging doubt on the integrity of mems accelerometers with acoustic injection attacks","author":"t","year":"2017","journal-title":"2017 IEEE European Symposium on Security and Privacy (EuroS&P) IEEE"},{"key":"ref54","first-page":"1092","article-title":"Limiting the impact of stealthy attacks on industrial control systems","author":"u","year":"2016","journal-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"},{"journal-title":"The Hall Effect and Its Applications","year":"2013","author":"chien","key":"ref17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IMTC.1993.382580"},{"key":"ref19","first-page":"655","article-title":"Dancing on the lip of the volcano: Chosen ciphertext attacks on apple imessage","author":"g","year":"2016","journal-title":"25th USENIX Security Symposium ( USENIX Security 16)"},{"key":"ref18","first-page":"1273","article-title":"Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter","author":"barua","year":"2020","journal-title":"29th USENIX Security Symposium (USENIX Security 20) USENIX Association"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3545948.3545964"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i4.438-462"},{"year":"2023","key":"ref46","article-title":"Grid-tied Solar Micro Inverter with MPPT"},{"year":"2020","key":"ref45","article-title":"Allegro MicroSystems: Hall-effect sensors consume very little power"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"1901353","DOI":"10.1002\/admi.201901353","article-title":"Outstanding absolute electromagnetic interference shielding effectiveness of cross-linked pedot: Pss film","volume":"6","author":"b","year":"2019","journal-title":"Advanced Materials Interfaces"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2004.1432505"},{"journal-title":"Theory and Calculation of Electric Circuits","year":"1917","author":"steinmetz","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1177\/875647939000600106"},{"key":"ref44","first-page":"559","article-title":"Benefits and costs of power-gating technique","author":"j","year":"2005","journal-title":"2005 International Conference on Computer Design IEEE"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/S0924-4247(96)01410-0"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmmm.2021.168118"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2593603"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2011.2172116"},{"key":"ref9","first-page":"368","article-title":"Investigation on the susceptibility of hall-effect current sensors to emi","author":"aiello","year":"2011","journal-title":"IEEE International Symposium on Electromagnetic Compatibility"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2009.5275282"},{"year":"2020","key":"ref3","article-title":"Hall-Effect Current Sensor Market"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"ref5","first-page":"145","article-title":"Ghost talk: Mitigating emi signal injection attacks against analog sensors","author":"k","year":"2013","journal-title":"2013 IEEE Symposium on Security and Privacy IEEE"},{"year":"2022","key":"ref40","article-title":"EFM32 Giant Gecko datasheet"},{"year":"2022","key":"ref35","article-title":"MET-28-T datasheet"},{"year":"2022","key":"ref34","article-title":"LV 25-P datasheet"},{"year":"2022","key":"ref37","article-title":"Zedboard datasheet"},{"year":"2022","key":"ref36","article-title":"MET-42-T datasheet"},{"year":"2022","key":"ref31","article-title":"CTF-5RL-0050 datasheet"},{"year":"2022","key":"ref30","article-title":"CSNS300 datasheet"},{"year":"2022","key":"ref33","article-title":"LTSR 6-NP datasheet"},{"year":"2022","key":"ref32","article-title":"CR8410 datasheet"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1109\/TSG.2011.2147809","article-title":"Design of a hall effect current microsensor for power networks","volume":"2","author":"t","year":"2011","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MEPCON.2008.4562343"},{"year":"2022","key":"ref39","article-title":"Circuit Design: How to make an amplitude modulated wave"},{"year":"2022","key":"ref38","article-title":"ADV7125V datasheet"},{"key":"ref24","article-title":"The fast Fourier transform and its applications","author":"brigham","year":"1988","journal-title":"Prentice-Hall Inc"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/7260.959312"},{"year":"2023","key":"ref26","article-title":"Maximal Length LFSR Feedback Terms"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546907"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"2073","DOI":"10.1002\/app.29812","article-title":"EMI shielding: Methods and materials-A review","volume":"112","author":"g","year":"2009","journal-title":"Journal of Applied Polymer Science"},{"year":"2022","key":"ref22","article-title":"Grove datasheet"},{"year":"2022","key":"ref21","article-title":"CR8320 datasheet"},{"year":"2020","key":"ref28","article-title":"Acs710 datasheet"},{"key":"ref27","first-page":"3","article-title":"A study on look-up table based sine wave generation","author":"salazar","year":"2011","journal-title":"Proceedings of the Regional Echomail Coordinator Porto Portugal"},{"year":"2020","key":"ref29","article-title":"Acs724 datasheet"}],"event":{"name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2023,5,1]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2023,5,4]]}},"container-title":["2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10132842\/10132914\/10133158.pdf?arnumber=10133158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T17:56:07Z","timestamp":1686592567000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10133158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/host55118.2023.10133158","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}