{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T09:07:23Z","timestamp":1772615243894,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,26]]},"DOI":"10.1109\/iscc61673.2024.10733582","type":"proceedings-article","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T17:32:28Z","timestamp":1730395948000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["A Conducted Compromising Emanations Method on High-Speed USB Devices via USB Hubs"],"prefix":"10.1109","author":[{"given":"Yixin","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China,100085"}]},{"given":"Haiyang","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China,100085"}]},{"given":"Qingqing","family":"Ye","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China,100085"}]},{"given":"Junjie","family":"Hu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China,100085"}]},{"given":"Yinglong","family":"Han","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China,100085"}]},{"given":"Zhiqiang","family":"Lv","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China,100085"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920314"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.008"},{"issue":"9","key":"ref4","first-page":"1","article-title":"Badusb-on accessories that turn evil","volume":"1","author":"Nohl","year":"2014","journal-title":"Black Hat USA"},{"key":"ref5","article-title":"Mouse trap: Exploiting firmware updates in {USB} peripherals","volume-title":"8th USENIX Workshop on Offensive Technologies (WOOT 14)","author":"Maskiewicz"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2011.34"},{"key":"ref7","first-page":"105","article-title":"Read it twice! a mass-storage-based tocttou attack","author":"Mulliner","year":"2012","journal-title":"WOOT"},{"key":"ref8","first-page":"1","article-title":"Compromising electromagnetic emanations of wired and wireless keyboards","volume-title":"USENIX security symposium","volume":"8","author":"Vuagnoux"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.04.008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00118"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/URSIAP-RASC.2016.7601331"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/APEMC.2016.7522785"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07329-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906972"},{"key":"ref15","first-page":"1145","article-title":"{USB} snooping made easy: crosstalk leakage attacks on {USB} hubs","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Su"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv5jxq2k.52"},{"key":"ref17","year":"1998","journal-title":"Revision 1.1"},{"key":"ref18","article-title":"Universal serial bus specification revision 2.0","author":"Compaq","year":"2000","journal-title":"USB Implementers\u2019 Forum. sn"},{"key":"ref19","article-title":"3.0 specification, revision 1.0, nov. 2008","author":"Bus"}],"event":{"name":"2024 IEEE Symposium on Computers and Communications (ISCC)","location":"Paris, France","start":{"date-parts":[[2024,6,26]]},"end":{"date-parts":[[2024,6,29]]}},"container-title":["2024 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10733347\/10733557\/10733582.pdf?arnumber=10733582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T06:37:08Z","timestamp":1732689428000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10733582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,26]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iscc61673.2024.10733582","relation":{},"subject":[],"published":{"date-parts":[[2024,6,26]]}}}