{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:52:13Z","timestamp":1777895533476,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196556","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"499-510","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["Electromagnetic Induction Attacks Against Embedded Systems"],"prefix":"10.1145","author":[{"given":"Jayaprakash","family":"Selvaraj","sequence":"first","affiliation":[{"name":"Iowa State University, Ames, IA, USA"}]},{"given":"G\u00f6k\u00e7en Y\u0131lmaz","family":"Dayan\u0131kl\u0131","sequence":"additional","affiliation":[{"name":"Virginia Tech, Arlington, VA, USA"}]},{"given":"Neelam Prabhu","family":"Gaunkar","sequence":"additional","affiliation":[{"name":"Iowa State University, Ames, IA, USA"}]},{"given":"David","family":"Ware","sequence":"additional","affiliation":[{"name":"Utah State University, Logan, UT, USA"}]},{"given":"Ryan M.","family":"Gerdes","sequence":"additional","affiliation":[{"name":"Virginia Tech, Arlington, VA, USA"}]},{"given":"Mani","family":"Mina","sequence":"additional","affiliation":[{"name":"Iowa State University, Ames, IA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"2009. Electromagnetic Compatibility Engineering. 1--843 pages.  2009. Electromagnetic Compatibility Engineering. 1--843 pages.","DOI":"10.1002\/9780470508510.ch1"},{"key":"e_1_3_2_1_2_1","unstructured":"C.K. Alexander and M.N.O Sadiku. 2001. Fundamentals of Electric Circuits.   C.K. Alexander and M.N.O Sadiku. 2001. Fundamentals of Electric Circuits."},{"key":"e_1_3_2_1_3_1","unstructured":"Analog Devices. 2016. Accelerometers Product Selection Table. (2016). Datasheet.  Analog Devices. 2016. Accelerometers Product Selection Table. (2016). Datasheet."},{"key":"e_1_3_2_1_4_1","volume-title":"2012 IEEE International Workshop on Antenna Technology (iWAT). 157--160","author":"Azad U.","unstructured":"U. Azad and Y. E. Wang . 2012. Analysis and experimental results for an inductively coupled near-field power transmission system . In 2012 IEEE International Workshop on Antenna Technology (iWAT). 157--160 . U. Azad and Y. E. Wang. 2012. Analysis and experimental results for an inductively coupled near-field power transmission system. In 2012 IEEE International Workshop on Antenna Technology (iWAT). 157--160."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2004.831814"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2010.2048844"},{"key":"e_1_3_2_1_7_1","first-page":"35","article-title":"Modelling of a direct power injection aggression on a 16 bit microcontroller input buffer","volume":"7","author":"Boyer A","year":"2007","unstructured":"A Boyer , S Bendhia , and E Sicard . 2007 . Modelling of a direct power injection aggression on a 16 bit microcontroller input buffer . EMC Compo 7 (2007), 35 -- 39 . A Boyer, S Bendhia, and E Sicard. 2007. Modelling of a direct power injection aggression on a 16 bit microcontroller input buffer. EMC Compo 7 (2007), 35--39.","journal-title":"EMC Compo"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2009.2017195"},{"key":"e_1_3_2_1_10_1","volume-title":"Analysis and measurement of signal distortion due to ESD protection circuits","author":"Chun J-H","year":"2006","unstructured":"J-H Chun and Boris Murmann . 2006. Analysis and measurement of signal distortion due to ESD protection circuits . IEEE journal of solid-state circuits 41, 10 ( 2006 ), 2354--2358. J-H Chun and Boris Murmann. 2006. Analysis and measurement of signal distortion due to ESD protection circuits. IEEE journal of solid-state circuits 41, 10 (2006), 2354--2358."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMCZUR.2006.214897"},{"key":"e_1_3_2_1_12_1","volume-title":"Researcher hacks self-driving car sensors","author":"Harris Mark","year":"2015","unstructured":"Mark Harris . 2015. Researcher hacks self-driving car sensors . IEEE Spectrum ( 2015 ). Mark Harris. 2015. Researcher hacks self-driving car sensors. IEEE Spectrum (2015)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2012.2206393"},{"key":"e_1_3_2_1_14_1","unstructured":"Stephen Hopwood. 2010. EMI Filter Hints and Tips. (2010).  Stephen Hopwood. 2010. EMI Filter Hints and Tips. (2010)."},{"key":"e_1_3_2_1_15_1","volume-title":"Integrated High-Voltage Electronics and Power Management, Low-Power and High-Resolution ADC's","author":"Huijsing J.","unstructured":"J. Huijsing , M. Steyaert , and A.H.M. van Roermund . 2013. Analog Circuit Design: Sensor and Actuator Interface Electronics , Integrated High-Voltage Electronics and Power Management, Low-Power and High-Resolution ADC's . Springer US. J. Huijsing, M. Steyaert, and A.H.M. van Roermund. 2013. Analog Circuit Design: Sensor and Actuator Interface Electronics, Integrated High-Voltage Electronics and Power Management, Low-Power and High-Resolution ADC's. Springer US."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/mop.24126"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sse.2009.09.006"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"e_1_3_2_1_20_1","volume-title":"The Real Story of Stuxnet","author":"Kushner David","year":"2013","unstructured":"David Kushner . 2013. The Real Story of Stuxnet . IEEE Spectrum (Feb . 26 2013 ). David Kushner. 2013. The Real Story of Stuxnet. IEEE Spectrum (Feb. 26 2013)."},{"key":"e_1_3_2_1_21_1","volume-title":"Electromagnetics from a quasistatic perspective. American Jourrnal of Physics (Mar","author":"Larsson Jonas","year":"2007","unstructured":"Jonas Larsson . 2007. Electromagnetics from a quasistatic perspective. American Jourrnal of Physics (Mar . 2007 ). Jonas Larsson. 2007. Electromagnetics from a quasistatic perspective. American Jourrnal of Physics (Mar. 2007)."},{"key":"e_1_3_2_1_23_1","volume-title":"Semiconductor Physics and Devices","author":"Neamen D.A.","unstructured":"D.A. Neamen . 2012. Semiconductor Physics and Devices . McGraw-Hill . D.A. Neamen. 2012. Semiconductor Physics and Devices. McGraw-Hill."},{"key":"e_1_3_2_1_24_1","volume-title":"Noise reduction techniques in electronic systems","author":"Ott H.W.","unstructured":"H.W. Ott . 1988. Noise reduction techniques in electronic systems . Wiley . H.W. Ott. 1988. Noise reduction techniques in electronic systems. Wiley."},{"key":"e_1_3_2_1_26_1","volume-title":"Introduction to Electromagnetic Compatibility","author":"Paul C.R.","unstructured":"C.R. Paul . 2006. Introduction to Electromagnetic Compatibility . Wiley . C.R. Paul. 2006. Introduction to Electromagnetic Compatibility. Wiley."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2004.831899"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"J.M. Redout\u00e9 and M. Steyaert. 2009. EMC of Analog Integrated Circuits. Springer.   J.M. Redout\u00e9 and M. Steyaert. 2009. EMC of Analog Integrated Circuits. Springer.","DOI":"10.1007\/978-90-481-3230-0"},{"key":"e_1_3_2_1_29_1","volume-title":"Analog Dialogue 17, 1","author":"Rich Alan","year":"1983","unstructured":"Alan Rich . 1983. Shielding and Guarding . Analog Dialogue 17, 1 ( 1983 ). Alan Rich. 1983. Shielding and Guarding. Analog Dialogue 17, 1 (1983)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2010.2071590"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.1968.302912"},{"key":"e_1_3_2_1_32_1","unstructured":"OSRAM Opto Semiconductors. 2015. Silicon PIN Photodiode with Daylight Blocking Filter SFH 235 FA. (2015) 9 pages.  OSRAM Opto Semiconductors. 2015. Silicon PIN Photodiode with Daylight Blocking Filter SFH 235 FA. (2015) 9 pages."},{"key":"e_1_3_2_1_33_1","volume-title":"Analog-digital conversion handbook","author":"Sheingold Daniel H","unstructured":"Daniel H Sheingold . 1986. Analog-digital conversion handbook . Vol. 16 . PrenticeHall Englewood Cliffs , NJ. Daniel H Sheingold. 1986. Analog-digital conversion handbook. Vol. 16. PrenticeHall Englewood Cliffs, NJ."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813679"},{"key":"e_1_3_2_1_36_1","volume-title":"2016 International Symposium on Antennas and Propagation (ISAP). 382--383","author":"So Y.","unstructured":"Y. So , W. Kim , J. Kim , Y. J. Yoon , and J. Park . 2016. Double-slot antipodal vivaldi antenna for improved directivity and radiation patterns . In 2016 International Symposium on Antennas and Propagation (ISAP). 382--383 . Y. So, W. Kim, J. Kim, Y. J. Yoon, and J. Park. 2016. Double-slot antipodal vivaldi antenna for improved directivity and radiation patterns. In 2016 International Symposium on Antennas and Propagation (ISAP). 382--383."},{"key":"e_1_3_2_1_37_1","unstructured":"Stormwise. 2018. Ultra Low Frequency Antennas for 150 Hz to 1.5 KHz. http:\/\/www.stormwise.com\/index.html. (2018).  Stormwise. 2018. Ultra Low Frequency Antennas for 150 Hz to 1.5 KHz. http:\/\/www.stormwise.com\/index.html. (2018)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2012.6351665"},{"key":"e_1_3_2_1_39_1","volume-title":"Master's thesis","author":"Taylor Aaron D","unstructured":"Aaron D Taylor . 2011. Microcontroller (8051-core) instruction susceptibility to intentional electromagnetic interference (IEMI). Master's thesis . University of New Mexico . Aaron D Taylor. 2011. Microcontroller (8051-core) instruction susceptibility to intentional electromagnetic interference (IEMI). Master's thesis. University of New Mexico."},{"key":"e_1_3_2_1_40_1","volume-title":"Datasheet","author":"Instruments Texas","year":"2014","unstructured":"Texas Instruments . 2014. TM4C123GH6 PM Microcontroller . ( 2014 ). Datasheet . Texas Instruments. 2014. TM4C123GH6PM Microcontroller. (2014). Datasheet."},{"key":"e_1_3_2_1_41_1","volume-title":"Proc. Int. workshop of EMC for ICs (EMCCOMPO 09)","author":"Villavicencio Yamarita","year":"2009","unstructured":"Yamarita Villavicencio , Francesco Musolino , and Franco Fiori . 2009 . Electrical model of a microcontroller for EMC analysis . In Proc. Int. workshop of EMC for ICs (EMCCOMPO 09) . 38. Yamarita Villavicencio, Francesco Musolino, and Franco Fiori. 2009. Electrical model of a microcontroller for EMC analysis. In Proc. Int. workshop of EMC for ICs (EMCCOMPO 09). 38."},{"key":"e_1_3_2_1_42_1","volume-title":"Fundamentals of Electromagnetics","author":"Voltmer David","unstructured":"David Voltmer . 2007. Fundamentals of Electromagnetics . Vol. 2 . 1--217 pages. David Voltmer. 2007. Fundamentals of Electromagnetics. Vol. 2. 1--217 pages."},{"key":"e_1_3_2_1_43_1","unstructured":"D.R. White. 1986. A Handbook on Electromagnetic Shielding Materials and Performance. Interference Control Technologies.  D.R. White. 1986. A Handbook on Electromagnetic Shielding Materials and Performance. Interference Control Technologies."},{"key":"e_1_3_2_1_44_1","volume-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON","author":"Yan Chen","year":"2016","unstructured":"Chen Yan , X Wenyuan , and Jianhao Liu . 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON ( 2016 ). Chen Yan, X Wenyuan, and Jianhao Liu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON (2016)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/15.990733"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196556","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196556"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":41,"alternative-id":["10.1145\/3196494.3196556","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196556","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}