{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:47:17Z","timestamp":1767340037144,"version":"3.28.0"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545402","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"21-32","source":"Crossref","is-referenced-by-count":4,"title":["NoiseHopper: Emission Hopping Air-Gap Covert Side Channel with Lower Probability of Detection"],"prefix":"10.1109","author":[{"given":"Md","family":"Faizul Bari","sequence":"first","affiliation":[{"name":"Purdue University,Dept. of ECE,West Lafayette,IN,USA"}]},{"given":"Shreyas","family":"Sen","sequence":"additional","affiliation":[{"name":"Purdue University,Dept. of ECE,West Lafayette,IN,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/milcom.2007.4455073"},{"volume-title":"Intelligence Communications System gets Tech Refresh","year":"2023","key":"ref2"},{"volume-title":"US military and intelligence computer networks","year":"2023","author":"P\/K","key":"ref3"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1109\/MSPEC.2013.6471059","article-title":"The real story of stuxnet","volume-title":"IEEE Spectrum","author":"Kushner","year":"2013"},{"volume-title":"Agent.btz","year":"2023","key":"ref5"},{"key":"ref6","article-title":"SymonLoader archives","volume-title":"Palo Alto Networks Blog","author":"Hayashi","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2023.3300035"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom56396.2022.00074"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906972"},{"key":"ref10","first-page":"849","article-title":"GSMem: Data exfiltration from Air-Gapped computers over GSM frequencies","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Guri"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3186627"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/host45689.2020.9300268"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2019.2917844"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2019.2952257"},{"volume-title":"SCISRS - Securing Compartmented Information with Smart Radio Systems","year":"2023","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ims37962.2022.9865347"},{"key":"ref17","article-title":"Compromising emanations: eavesdropping risks of com-puter displays","volume-title":"University of Cambridge)","author":"Kuhn","year":"2002"},{"key":"ref18","first-page":"1432","article-title":"Unintentional Compromising Electromagnetic Emanations from IT Equipment: A Concept Map of Do-main Knowledge","volume-title":"Procedia Computer Science","volume":"200","author":"Martin","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/dsc49826.2021.9346271"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/emceurope.2018.8485128"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/icaccs54159.2022.9785170"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329846"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/icc45855.2022.9839155"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SPW54247.2022.9833894"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/icassp40776.2020.9054006"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/date56975.2023.10137263"},{"key":"ref27","first-page":"88","article-title":"Electromagnetic eavesdropping risks of flat-panel dis-plays","volume-title":"International Workshop on Privacy Enhancing Technologies","author":"Kuhn","year":"2004"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2018.2855448"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3162686"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MEMC.2022.9982567"},{"volume-title":"Tempest for Eliza","year":"2001","author":"Thiele","key":"ref31"},{"issue":"1","key":"ref32","first-page":"1","article-title":"Your Noise, My Signal","volume-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems","volume":"4","author":"Shao","year":"2020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2938404"},{"key":"ref34","first-page":"115","article-title":"MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU -generated magnetic fields","volume-title":"Future Generation Computer Systems","volume":"115","author":"Guri","year":"2021"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428065"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00118"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-319-60876-1_8","article-title":"LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Guri","year":"2017"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2854708"},{"issue":"2","key":"ref39","first-page":"1541","article-title":"Optical Exfiltration of Data via Keyboard LED Status Indicators to IP Cameras","volume-title":"IEEE Internet of Things Journal","volume":"6","author":"Zhou","year":"2019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CMI48017.2019.8962137"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906933"},{"volume-title":"On Covert Acoustical Mesh Networks in Air","year":"2014","author":"Hanspach","key":"ref42"},{"key":"ref43","first-page":"3","volume-title":"On Acoustic Covert Channels Between Air-Gapped Systems","author":"Carrara","year":"2015"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/978-3-319-66399-9_6","article-title":"Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise (,DiskFiltration\u2018)","volume-title":"Computer Security - ESORICS 2017","author":"Guri","year":"2017"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2018.8625124"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-163"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.26"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC49498.2019.9108874"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00020"},{"key":"ref50","article-title":"Edward Snowden: the whistleblower behind the NSA surveillance revelations","volume-title":"The Guardian","author":"Greenwald","year":"2013"},{"volume-title":"Exclusive: Snowden persuaded other NSA workers to give up passwords - sources","year":"2013","author":"Hosenball","key":"ref51"},{"volume-title":"FastPwmPin","year":"2023","author":"R&D","key":"ref52"},{"volume-title":"MNIST in CSV","year":"2023","key":"ref53"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/temc.2014.2300139"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/iscas46773.2023.10181751"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2024,5,6]]},"location":"Tysons Corner, VA, USA","end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545402.pdf?arnumber=10545402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T04:12:38Z","timestamp":1717906358000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545402\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545402","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}