{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:10:26Z","timestamp":1774627826085,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3241539.3241580","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:04:36Z","timestamp":1539695076000},"page":"337-351","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":74,"title":["Ghostbuster"],"prefix":"10.1145","author":[{"given":"Anadi","family":"Chaman","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Jiaming","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Jiachen","family":"Sun","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Haitham","family":"Hassanieh","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Romit","family":"Roy Choudhury","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Are TV detector vans just a cunning con trick? Daily Mail (October","author":"Adams Guy","year":"2013","unstructured":"Guy Adams . 2013. Are TV detector vans just a cunning con trick? Daily Mail (October 2013 ). Guy Adams. 2013. Are TV detector vans just a cunning con trick? Daily Mail (October 2013)."},{"key":"e_1_3_2_1_2_1","volume-title":"Myth of the TV detector van? The Telegraph (September","author":"Carter Claire","year":"2013","unstructured":"Claire Carter . 2013. Myth of the TV detector van? The Telegraph (September 2013 ). Claire Carter. 2013. Myth of the TV detector van? The Telegraph (September 2013)."},{"key":"e_1_3_2_1_3_1","volume-title":"Do TV detector vans exist? Leaked document suggests they could be a ruse . Radio Times (September","author":"Dowell Ben","year":"2013","unstructured":"Ben Dowell . 2013. Do TV detector vans exist? Leaked document suggests they could be a ruse . Radio Times (September 2013 ). Ben Dowell. 2013. Do TV detector vans exist? Leaked document suggests they could be a ruse . Radio Times (September 2013)."},{"key":"e_1_3_2_1_4_1","volume-title":"CHES","author":"Gandolfi Karine","year":"2001","unstructured":"Karine Gandolfi , Christophe Mourtel , and Francis Olivier . 2001 . Electromagnetic analysis: Concrete results. In Cryptographic Hardware and Embedded Systems , CHES 2001. Springer, 251--261. Karine Gandolfi, Christophe Mourtel, and Francis Olivier. 2001. Electromagnetic analysis: Concrete results. In Cryptographic Hardware and Embedded Systems, CHES 2001. Springer, 251--261."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851486"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-015-0100-7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018438"},{"key":"e_1_3_2_1_10_1","unstructured":"Haitham Hassanieh Jue Wang Dina Katabi and Tadayoshi Kohno. 2015. Securing RFIDs by Randomizing the Modulation and Channel. In NSDI .   Haitham Hassanieh Jue Wang Dina Katabi and Tadayoshi Kohno. 2015. Securing RFIDs by Randomizing the Modulation and Channel. In NSDI ."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2014.6946014"},{"key":"e_1_3_2_1_12_1","first-page":"167","article-title":"Local oscillator leak cancellation circuit. (Dec. 26 2000)","volume":"6","author":"Kannell George Kenneth","year":"2000","unstructured":"George Kenneth Kannell , Robert Evan Myer , and Krishnamurthy Sreenath . 2000 . Local oscillator leak cancellation circuit. (Dec. 26 2000) . US Patent 6 , 167 ,247. George Kenneth Kannell, Robert Evan Myer, and Krishnamurthy Sreenath. 2000. Local oscillator leak cancellation circuit. (Dec. 26 2000). US Patent 6,167,247.","journal-title":"US Patent"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653668"},{"key":"e_1_3_2_1_14_1","first-page":"530","article-title":"Homodyne receiver minimizing oscillator leakage. (June 25 1996)","volume":"5","author":"Lindqvist Bjorn","year":"1996","unstructured":"Bjorn Lindqvist and Martin Isberg . 1996 . Homodyne receiver minimizing oscillator leakage. (June 25 1996) . US Patent 5 , 530 ,929. Bjorn Lindqvist and Martin Isberg. 1996. Homodyne receiver minimizing oscillator leakage. (June 25 1996). US Patent 5,530,929.","journal-title":"US Patent"},{"key":"e_1_3_2_1_15_1","volume-title":"Javier V'ia Rodr'iguez, Luis Ignacio Santamar'ia Caballero, et almbox.","author":"Manco V\u00e1squez Julio C\u00e9sar","year":"2015","unstructured":"Julio C\u00e9sar Manco V\u00e1squez , Jes\u00fas Mar'ia Ib\u00e1 nez D'iaz , Javier V'ia Rodr'iguez, Luis Ignacio Santamar'ia Caballero, et almbox. 2015 . Detection of radio receivers: An experimental evaluation approach. (2015). Julio C\u00e9sar Manco V\u00e1squez, Jes\u00fas Mar'ia Ib\u00e1 nez D'iaz, Javier V'ia Rodr'iguez, Luis Ignacio Santamar'ia Caballero, et almbox. 2015. Detection of radio receivers: An experimental evaluation approach. (2015)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288501"},{"key":"e_1_3_2_1_17_1","volume-title":"The 2006 IEEE 2006 International Conference on. IEEE, 417--421","author":"Park Sanghoon","year":"2006","unstructured":"Sanghoon Park , Lawrence E Larson , and Laurence B Milstein . 2006 . Hidden mobile terminal device discovery in a UWB environment. In Ultra-Wideband , The 2006 IEEE 2006 International Conference on. IEEE, 417--421 . Sanghoon Park, Lawrence E Larson, and Laurence B Milstein. 2006. Hidden mobile terminal device discovery in a UWB environment. In Ultra-Wideband, The 2006 IEEE 2006 International Conference on. IEEE, 417--421."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2010.2050955"},{"key":"e_1_3_2_1_19_1","unstructured":"Sarah A Seguin. 2009. Detection of low cost radio frequency receivers based on their unintended electromagnetic emissions and an active stimulation. (2009).  Sarah A Seguin. 2009. Detection of low cost radio frequency receivers based on their unintended electromagnetic emissions and an active stimulation. (2009)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2101330"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2012.2219141"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2013.2267472"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Mathy Vanhoef and Frank Piessens. 2017. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. (2017).  Mathy Vanhoef and Frank Piessens. 2017. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. (2017).","DOI":"10.1145\/3133956.3134027"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2012.6181821"},{"key":"e_1_3_2_1_26_1","unstructured":"R. Verdult F. Garcia and J. Balasch. 2012. Gone in 360 secs: Hijacking with hitag2. In Usenix Security .   R. Verdult F. Garcia and J. Balasch. 2012. Gone in 360 secs: Hijacking with hitag2. In Usenix Security ."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2005.1542626"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2014.2300139"}],"event":{"name":"MobiCom '18: The 24th Annual International Conference on Mobile Computing and Networking","location":"New Delhi India","acronym":"MobiCom '18","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 24th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3241539.3241580","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3241539.3241580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:37Z","timestamp":1750208257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3241539.3241580"}},"subtitle":["Detecting the Presence of Hidden Eavesdroppers"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":27,"alternative-id":["10.1145\/3241539.3241580","10.1145\/3241539"],"URL":"https:\/\/doi.org\/10.1145\/3241539.3241580","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}