{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T22:57:26Z","timestamp":1774047446611,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61702451"],"award-info":[{"award-number":["61702451"]}]},{"name":"Natural Science Foundation of Zhejiang Province","award":["LGG19F020020"],"award-info":[{"award-number":["LGG19F020020"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["2019QNA4027"],"award-info":[{"award-number":["2019QNA4027"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3339810","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1149-1170","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":65,"title":["DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU"],"prefix":"10.1145","author":[{"given":"Yushi","family":"Cheng","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Juchuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Yi-Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","article-title":"Identification of wearable devices with bluetooth","author":"Aksu H.","year":"2018","unstructured":"Aksu , H. , Uluagac , A. S. , and Bentley , E . Identification of wearable devices with bluetooth . IEEE Transactions on Sustainable Computing ( 2018 ). Aksu, H., Uluagac, A. S., and Bentley, E. Identification of wearable devices with bluetooth. IEEE Transactions on Sustainable Computing (2018).","journal-title":"IEEE Transactions on Sustainable Computing ("},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16060818"},{"key":"e_1_3_2_2_3_1","volume-title":"Aug. 31","author":"Bellovin S. M.","year":"1993","unstructured":"Bellovin , S. M. , and Merritt , M . Cryptographic protocol for secure communications , Aug. 31 1993 . US Patent 5,241,599. Bellovin, S. M., and Merritt, M. Cryptographic protocol for secure communications, Aug. 31 1993. US Patent 5,241,599."},{"key":"e_1_3_2_2_4_1","volume-title":"Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416","author":"Bojinov H.","year":"2014","unstructured":"Bojinov , H. , Michalevsky , Y. , Nakibly , G. , and Boneh , D . Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416 ( 2014 ). Bojinov, H., Michalevsky, Y., Nakibly, G., and Boneh, D. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416 (2014)."},{"key":"e_1_3_2_2_5_1","first-page":"116","volume-title":"ACM","author":"Brik V.","unstructured":"Brik , V. , Banerjee , S. , Gruteser , M. , and Oh , S . Wireless device identification with radiometric signatures. In MobiCom (2008) , ACM , pp. 116 -- 127 . Brik, V., Banerjee, S., Gruteser, M., and Oh, S. Wireless device identification with radiometric signatures. In MobiCom (2008), ACM, pp. 116--127."},{"key":"e_1_3_2_2_6_1","unstructured":"Brown G. FEAST January 2017. https:\/\/github.com\/Craigacp\/FEAST.  Brown G. FEAST January 2017. https:\/\/github.com\/Craigacp\/FEAST."},{"key":"e_1_3_2_2_7_1","unstructured":"Bullock J. LibXtract July 2014. http:\/\/jamiebullock.github.io\/ LibXtract\/documentation\/.  Bullock J. LibXtract July 2014. http:\/\/jamiebullock.github.io\/ LibXtract\/documentation\/."},{"key":"e_1_3_2_2_8_1","first-page":"401","volume-title":"ACM","author":"Callan R.","unstructured":"Callan , R. , Behrang , F. , Zajic , A. , Prvulovic , M. , and Orso , A . Zero-overhead profiling via em emanations. In ISSTA (2016) , ACM , pp. 401 -- 412 . Callan, R., Behrang, F., Zajic, A., Prvulovic, M., and Orso, A. Zero-overhead profiling via em emanations. In ISSTA (2016), ACM, pp. 401--412."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2015.7146508"},{"key":"e_1_3_2_2_10_1","first-page":"199","volume-title":"APEC","volume":"1","author":"Cleveland T. L.","year":"2005","unstructured":"Cleveland , T. L. Bi-directional power system for laptop computers . In APEC ( 2005 ), vol. 1 , IEEE, pp. 199 -- 203 . Cleveland, T. L. Bi-directional power system for laptop computers. In APEC (2005), vol. 1, IEEE, pp. 199--203."},{"key":"e_1_3_2_2_11_1","first-page":"441","volume-title":"ACM","author":"Das A.","unstructured":"Das , A. , Borisov , N. , and Caesar , M . Do you hear what i hear?: Fingerprinting smart devices through embedded acoustic components. In CCS (2014) , ACM , pp. 441 -- 452 . Das, A., Borisov, N., and Caesar, M. Do you hear what i hear?: Fingerprinting smart devices through embedded acoustic components. In CCS (2014), ACM, pp. 441--452."},{"key":"e_1_3_2_2_12_1","first-page":"46","volume-title":"ACM","author":"Desmond L. C. C.","unstructured":"Desmond , L. C. C. , Yuan , C. C. , Pheng , T. C. , and Lee , R. S . Identifying unique devices through wireless fingerprinting. In WiSec (2008) , ACM , pp. 46 -- 55 . Desmond, L. C. C., Yuan, C. C., Pheng, T. C., and Lee, R. S. Identifying unique devices through wireless fingerprinting. In WiSec (2008), ACM, pp. 46--55."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23059"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.926987"},{"key":"e_1_3_2_2_15_1","first-page":"16","volume-title":"USENIX Security","volume":"3","author":"Franklin J.","year":"2006","unstructured":"Franklin , J. , McCoy , D. , Tabriz , P. , Neagoe , V. , Randwyk , J. V. , and Sicker , D . Passive data link layer 802.11 wireless device driver fingerprinting . In USENIX Security ( 2006 ), vol. 3 , pp. 16 -- 89 . Franklin, J., McCoy, D., Tabriz, P., Neagoe, V., Randwyk, J. V., and Sicker, D. Passive data link layer 802.11 wireless device driver fingerprinting. In USENIX Security (2006), vol. 3, pp. 16--89."},{"key":"e_1_3_2_2_16_1","volume-title":"Gartner Forecasts Flat Worldwide Device Shipments Until","author":"Gartner","year":"2018","unstructured":"Gartner . Gartner Forecasts Flat Worldwide Device Shipments Until 2018 , January 2017. http:\/\/www.gartner.com\/newsroom\/id\/3560517. Gartner. Gartner Forecasts Flat Worldwide Device Shipments Until 2018, January 2017. http:\/\/www.gartner.com\/newsroom\/id\/3560517."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"e_1_3_2_2_18_1","volume-title":"Understanding and eliminating emi in microcontroller applications. National Semiconductor","author":"Getz R.","year":"1996","unstructured":"Getz , R. , and Moeckel , B . Understanding and eliminating emi in microcontroller applications. National Semiconductor ( 1996 ). Getz, R., and Moeckel, B. Understanding and eliminating emi in microcontroller applications. National Semiconductor (1996)."},{"key":"e_1_3_2_2_19_1","volume-title":"Extremely randomized trees. Machine learning 63, 1","author":"Geurts P.","year":"2006","unstructured":"Geurts , P. , Ernst , D. , and Wehenkel , L . Extremely randomized trees. Machine learning 63, 1 ( 2006 ), 3--42. Geurts, P., Ernst, D., and Wehenkel, L. Extremely randomized trees. Machine learning 63, 1 (2006), 3--42."},{"key":"e_1_3_2_2_20_1","first-page":"1","article-title":"Radio frequency fingerprinting for intrusion detection in wireless networks","volume":"12","author":"Hall J.","year":"2005","unstructured":"Hall , J. , Barbeau , M. , and Kranakis , E . Radio frequency fingerprinting for intrusion detection in wireless networks . IEEE Transactions on Defendable and Secure Computing 12 ( 2005 ), 1 -- 35 . Hall, J., Barbeau, M., and Kranakis, E. Radio frequency fingerprinting for intrusion detection in wireless networks. IEEE Transactions on Defendable and Secure Computing 12 (2005), 1--35.","journal-title":"IEEE Transactions on Defendable and Secure Computing"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_19"},{"key":"e_1_3_2_2_22_1","volume-title":"March","author":"Instrument T.","year":"2016","unstructured":"Instrument , T. Integrated Fluxgate Magnetic Sensor IC for Open-Loop Applications , March 2016 . https:\/\/www.ti.com\/product\/DRV425. Instrument, T. Integrated Fluxgate Magnetic Sensor IC for Open-Loop Applications, March 2016. https:\/\/www.ti.com\/product\/DRV425."},{"key":"e_1_3_2_2_23_1","volume-title":"April","author":"Instruments T.","year":"2017","unstructured":"Instruments , T. MSP430F5529 LaunchPad Development Kit , April 2017 . http:\/\/www.ti.com\/lit\/ug\/slau533d\/slau533d.pdf. Instruments, T. MSP430F5529 LaunchPad Development Kit, April 2017. http:\/\/www.ti.com\/lit\/ug\/slau533d\/slau533d.pdf."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.628674"},{"key":"e_1_3_2_2_25_1","unstructured":"Keysight. U2541A 250kSa\/s USB Modular Simultaneous Data Acquisition June 2017. https:\/\/tinyurl.com\/yb5r768y.  Keysight. U2541A 250kSa\/s USB Modular Simultaneous Data Acquisition June 2017. https:\/\/tinyurl.com\/yb5r768y."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/WESCON.1993.488465"},{"key":"e_1_3_2_2_28_1","unstructured":"Le Sueur E. and Heiser G. Dynamic voltage and frequency scaling: The laws of diminishing returns.  Le Sueur E. and Heiser G. Dynamic voltage and frequency scaling: The laws of diminishing returns."},{"key":"e_1_3_2_2_29_1","first-page":"2","article-title":"Digital camera identification from sensor pattern noise","volume":"1","author":"Lukas J.","year":"2006","unstructured":"Lukas , J. , Fridrich , J. , and Goljan , M . Digital camera identification from sensor pattern noise . IEEE Transactions on Information Forensics and Security 1 , 2 ( 2006 ), 205--214. Lukas, J., Fridrich, J., and Goljan, M. Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 205--214.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_2_30_1","volume-title":"Hyperthreading technology in the netburst\u00ae microarchitecture. Hot Chips","author":"Marr D.","year":"2002","unstructured":"Marr , D. , Binns , F. , Hill , D. , Hinton , G. , Koufaty , D. , Hyperthreading technology in the netburst\u00ae microarchitecture. Hot Chips ( 2002 ). Marr, D., Binns, F., Hill, D., Hinton, G., Koufaty, D., et al. Hyperthreading technology in the netburst\u00ae microarchitecture. Hot Chips (2002)."},{"key":"e_1_3_2_2_31_1","volume-title":"Sept. 1","author":"Mondri R.","year":"2009","unstructured":"Mondri , R. , and Bitan , S . Inspected secure communication protocol , Sept. 1 2009 . US Patent 7,584,505. Mondri, R., and Bitan, S. Inspected secure communication protocol, Sept. 1 2009. US Patent 7,584,505."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.01.006"},{"key":"e_1_3_2_2_33_1","first-page":"99","volume-title":"ACM","author":"Pang J.","unstructured":"Pang , J. , Greenstein , B. , Gummadi , R. , Seshan , S. , and Wetherall , D . 802.11 user fingerprinting. In MobiCom (2007) , ACM , pp. 99 -- 110 . Pang, J., Greenstein, B., Gummadi, R., Seshan, S., and Wetherall, D. 802.11 user fingerprinting. In MobiCom (2007), ACM, pp. 99--110."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369033"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2000.895399"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2005.1577145"},{"key":"e_1_3_2_2_37_1","volume-title":"Windows internals","author":"Solomon D. A.","year":"2009","unstructured":"Solomon , D. A. , Russinovich , M. E. , and Ionescu , A . Windows internals . Microsoft Press , 2009 . Solomon, D. A., Russinovich, M. E., and Ionescu, A. Windows internals. Microsoft Press, 2009."},{"key":"e_1_3_2_2_38_1","volume-title":"ICEEE","author":"Suleiman D.","year":"2005","unstructured":"Suleiman , D. , Ibrahim , M. , and Hamarash , I . Dynamic voltage frequency scaling (dvfs) for microprocessors power and energy reduction . In ICEEE ( 2005 ). Suleiman, D., Ibrahim, M., and Hamarash, I. Dynamic voltage frequency scaling (dvfs) for microprocessors power and energy reduction. In ICEEE (2005)."},{"key":"e_1_3_2_2_39_1","unstructured":"Travers M. Cpu power consumption experiments and results analysis of intel i7--4820k.  Travers M. Cpu power consumption experiments and results analysis of intel i7--4820k."},{"key":"e_1_3_2_2_40_1","first-page":"305","volume-title":"CNS","author":"Uluagac A. S.","year":"2013","unstructured":"Uluagac , A. S. , Radhakrishnan , S. V. , Corbett , C. , Baca , A. , and Beyah , R . A passive technique for fingerprinting wireless devices with wired-side observations . In CNS ( 2013 ), IEEE, pp. 305 -- 313 . Uluagac, A. S., Radhakrishnan, S. V., Corbett, C., Baca, A., and Beyah, R. A passive technique for fingerprinting wireless devices with wired-side observations. In CNS (2013), IEEE, pp. 305--313."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2007.364330"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30806-7_7"},{"key":"e_1_3_2_2_43_1","first-page":"4309","volume-title":"ACM","author":"Vaucelle C.","unstructured":"Vaucelle , C. , Ishii , H. , and Paradiso , J. A . Cost-effective wearable sensor to detect emf. In CHI (2009) , ACM , pp. 4309 -- 4314 . Vaucelle, C., Ishii, H., and Paradiso, J. A. Cost-effective wearable sensor to detect emf. In CHI (2009), ACM, pp. 4309--4314."},{"key":"e_1_3_2_2_44_1","first-page":"15","volume-title":"ACM","author":"Wang E. J.","unstructured":"Wang , E. J. , Lee , T.-J. , Mariakakis , A. , Goel , M. , Gupta , S. , and Patel , S. N . Magnifisense: Inferring device interaction using wristworn passive magneto-inductive sensors. In UbiComp (2015) , ACM , pp. 15 -- 26 . Wang, E. J., Lee, T.-J., Mariakakis, A., Goel, M., Gupta, S., and Patel, S. N. Magnifisense: Inferring device interaction using wristworn passive magneto-inductive sensors. In UbiComp (2015), ACM, pp. 15--26."},{"key":"e_1_3_2_2_45_1","volume-title":"May","author":"Wikipedia","year":"2018","unstructured":"Wikipedia . Amp\u00e8re's circuital law , May 2018 . https:\/\/en.wikipedia. org\/wiki\/Amp%C3%A8re%27s_circuital_law. Wikipedia. Amp\u00e8re's circuital law, May 2018. https:\/\/en.wikipedia. org\/wiki\/Amp%C3%A8re%27s_circuital_law."},{"key":"e_1_3_2_2_46_1","volume-title":"NDSS","author":"Yen T.-F.","year":"2012","unstructured":"Yen , T.-F. , Xie , Y. , Yu , F. , Yu , R. P. , and Abadi , M . Host fingerprinting and tracking on the web: Privacy and security implications . In NDSS ( 2012 ). Yen, T.-F., Xie, Y., Yu, F., Yu, R. P., and Abadi, M. Host fingerprinting and tracking on the web: Privacy and security implications. In NDSS (2012)."},{"key":"e_1_3_2_2_47_1","first-page":"429","volume-title":"ACM","author":"Zhou Z.","unstructured":"Zhou , Z. , Diao , W. , Liu , X. , and Zhang , K . Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound. In CCS (2014) , ACM , pp. 429 -- 440 . Zhou, Z., Diao, W., Liu, X., and Zhang, K. Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound. In CCS (2014), ACM, pp. 429--440."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2016.10.017"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3339810","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3339810","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:01Z","timestamp":1750202641000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3339810"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":48,"alternative-id":["10.1145\/3319535.3339810","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3339810","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}