{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T19:53:01Z","timestamp":1775850781888,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Agence Nationale de la Recherche","award":["ANR-16-CE25-0015"],"award-info":[{"award-number":["ANR-16-CE25-0015"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243802","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"163-177","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":128,"title":["Screaming Channels"],"prefix":"10.1145","author":[{"given":"Giovanni","family":"Camurati","sequence":"first","affiliation":[{"name":"EURECOM, Sophia Antipolis, France"}]},{"given":"Sebastian","family":"Poeplau","sequence":"additional","affiliation":[{"name":"EURECOM, Sophia Antipolis, France"}]},{"given":"Marius","family":"Muench","sequence":"additional","affiliation":[{"name":"EURECOM, Sophia Antipolis, France"}]},{"given":"Tom","family":"Hayes","sequence":"additional","affiliation":[{"name":"EURECOM, Sophia Antipolis, France"}]},{"given":"Aur\u00e9lien","family":"Francillon","sequence":"additional","affiliation":[{"name":"EURECOM, Sophia Antipolis, France"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"12","article-title":"Substrate Noise Coupling in SoC Design","volume":"94","author":"Afzali-Kusha A.","year":"2006","journal-title":"Modeling, Avoidance, and Validation. Proc. IEEE"},{"key":"e_1_3_2_2_2_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES","author":"Agrawal Dakshi","year":"2002"},{"key":"e_1_3_2_2_3_1","unstructured":"Michael Bailey. 2011. General Layout Guidelines for RF and Mixed-Signal PCBs. APP 5100 https:\/\/www.maximintegrated.com\/en\/app-notes\/index.mvp\/id\/5100.  Michael Bailey. 2011. General Layout Guidelines for RF and Mixed-Signal PCBs. APP 5100 https:\/\/www.maximintegrated.com\/en\/app-notes\/index.mvp\/id\/5100."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","volume-title":"Wireless LAN Radios: System Definition to Transistor Design","author":"Behzad Arya","DOI":"10.1002\/9780470209301"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/993247.993251"},{"key":"e_1_3_2_2_7_1","unstructured":"Bluetooth SIG. 2016. Core Specification. https:\/\/www.bluetooth.org\/DocMan\/handlers\/DownloadDoc.ashx?doc_id=421043.  Bluetooth SIG. 2016. Core Specification. https:\/\/www.bluetooth.org\/DocMan\/handlers\/DownloadDoc.ashx?doc_id=421043."},{"key":"e_1_3_2_2_8_1","unstructured":"bolek42. 2017. bolek42\/rsa-sdr. https:\/\/github.com\/bolek42\/rsa-sdr  bolek42. 2017. bolek42\/rsa-sdr. https:\/\/github.com\/bolek42\/rsa-sdr"},{"key":"e_1_3_2_2_9_1","volume-title":"Gerd Vandersteen, and Yves Rolain.","author":"Bronckers Stephane","year":"2009"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931065"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.39"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750394"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241580"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"B. Chatterjee D. Das S. Maity and S. Sen. 2018. RF-PUF: Enhancing IoT Security through Authentication of Wireless Nodes using In-situ Machine Learning. ArXiv e-prints (May 2018). arxiv: cs.CR\/1805.01374  B. Chatterjee D. Das S. Maity and S. Sen. 2018. RF-PUF: Enhancing IoT Security through Authentication of Wireless Nodes using In-situ Machine Learning. ArXiv e-prints (May 2018). arxiv: cs.CR\/1805.01374","DOI":"10.1109\/HST.2018.8383916"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379782"},{"key":"e_1_3_2_2_16_1","unstructured":"ANALOG DEVICES. (undated). Mixed Signal Circuit Techniques. AN-280 http:\/\/www.analog.com\/media\/en\/technical-documentation\/application-notes\/294542582256114777959693992461771205AN280.pdf.  ANALOG DEVICES. (undated). Mixed Signal Circuit Techniques. AN-280 http:\/\/www.analog.com\/media\/en\/technical-documentation\/application-notes\/294542582256114777959693992461771205AN280.pdf."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"e_1_3_2_2_18_1","unstructured":"William Entriken. 2013. System Bus Radio. https:\/\/github.com\/fulldecent\/system-bus-radio  William Entriken. 2013. System Bus Radio. https:\/\/github.com\/fulldecent\/system-bus-radio"},{"key":"e_1_3_2_2_19_1","unstructured":"Jos\u00e9 Esteves Emmanuel Cottais and Chaouki Kasmi. 2018. Second Order Soft-TEMPEST in RF Front-Ends: Design and Detection of Polyglot Modulations.  Jos\u00e9 Esteves Emmanuel Cottais and Chaouki Kasmi. 2018. Second Order Soft-TEMPEST in RF Front-Ends: Design and Detection of Polyglot Modulations."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/648254.752700"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_13"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196518"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_17"},{"key":"e_1_3_2_2_25_1","unstructured":"Great Scott Gadgets. 2017. HackRF one. https:\/\/greatscottgadgets.com\/hackrf\/.  Great Scott Gadgets. 2017. HackRF one. https:\/\/greatscottgadgets.com\/hackrf\/."},{"key":"e_1_3_2_2_26_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Guri Mordechai","year":"2015"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2012.2227486"},{"key":"e_1_3_2_2_28_1","unstructured":"Philip Hodgers Francesco Regazzoni Richard Gilmore Ciara Moore and Tobias Oder. 2016. Secure Architectures of Future Emerging cryptography: State-of-the-Art in Physical Side-Channel Attacks and Resistant Technologies. (2016). http:\/\/www.safecrypto.eu\/wp-content\/uploads\/2015\/02\/SAFEcrypto_D7.1-Approved.pdf  Philip Hodgers Francesco Regazzoni Richard Gilmore Ciara Moore and Tobias Oder. 2016. Secure Architectures of Future Emerging cryptography: State-of-the-Art in Physical Side-Channel Attacks and Resistant Technologies. (2016). http:\/\/www.safecrypto.eu\/wp-content\/uploads\/2015\/02\/SAFEcrypto_D7.1-Approved.pdf"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.06.063"},{"key":"e_1_3_2_2_30_1","volume-title":"Advances in Cryptology -- CRYPTO' 99,","author":"Kocher Paul"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_7"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/975053"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_21"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_27"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978299"},{"key":"e_1_3_2_2_36_1","volume-title":"Power analysis attacks: Revealing the secrets of smart cards","author":"Mangard Stefan"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12678-9_17"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10175-0_17"},{"key":"e_1_3_2_2_40_1","volume-title":"Electromagnetic compatibility engineering","author":"Ott Henry W"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/RWS.2008.4463450"},{"key":"e_1_3_2_2_42_1","volume-title":"d.}. Grounding in mixed-signal systems demystified, Part 1. Analog Applications Journal","author":"Pithadia Sanjay","year":"2013"},{"key":"e_1_3_2_2_43_1","series-title":"Lecture Notes in Computer Science","volume-title":"ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards","author":"Quisquater Jean-Jacques","year":"2001"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2018.00016"},{"key":"e_1_3_2_2_45_1","unstructured":"Craig Ramsay and Jasper Lohuis. 2017. TEMPEST attacks against AES. Fox-IT whitepaper. Available at: https:\/\/www.fox-it.com\/en\/insights\/blogs\/blog\/tempest-attacks-aes\/.  Craig Ramsay and Jasper Lohuis. 2017. TEMPEST attacks against AES. Fox-IT whitepaper. Available at: https:\/\/www.fox-it.com\/en\/insights\/blogs\/blog\/tempest-attacks-aes\/."},{"key":"e_1_3_2_2_46_1","volume-title":"An Inside Job: Remote Power Analysis Attacks on FPGAs. DATE 2018","author":"Schellenberg Falk","year":"2018"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0053-7"},{"key":"e_1_3_2_2_48_1","volume-title":"Cl\u00e9 mentine Maurice, and Stefan Mangard","author":"Schwarz Michael","year":"2017"},{"key":"e_1_3_2_2_49_1","unstructured":"R.M. Secareanu S. Warner S. Seabridge C. Burke T.E. Watrobski C. Morton W. Staub T. Teilier and E.G. Friendman. {n. d.}. Physical design to improve the noise immunity of digital circuits in a mixed-signal smart-power system. 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353) ({n. d.}).  R.M. Secareanu S. Warner S. Seabridge C. Burke T.E. Watrobski C. Morton W. Staub T. Teilier and E.G. Friendman. {n. d.}. Physical design to improve the noise immunity of digital circuits in a mixed-signal smart-power system. 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353) ({n. d.})."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/3195638.3195710"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.1050"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939936"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855769"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.23919\/EuCAP.2017.7928125"},{"key":"e_1_3_2_2_57_1","unstructured":"Zeptobars. 2014. nRF51822 - Bluetooth LE SoC : weekend die-shot. https:\/\/zeptobars.com\/en\/read\/nRF51822-Bluetooth-LE-SoC-Cortex-M0.  Zeptobars. 2014. nRF51822 - Bluetooth LE SoC : weekend die-shot. https:\/\/zeptobars.com\/en\/read\/nRF51822-Bluetooth-LE-SoC-Cortex-M0."},{"key":"e_1_3_2_2_58_1","volume-title":"FPGA-Based Remote Power Side-Channel Attacks. In 2018 IEEE Symposium on Security and Privacy (SP)","volume":"00","author":"Zhao M."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243802","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:18Z","timestamp":1750212498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243802"}},"subtitle":["When Electromagnetic Side Channels Meet Radio Transceivers"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":54,"alternative-id":["10.1145\/3243734.3243802","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243802","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}