{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:41:28Z","timestamp":1772642488616,"version":"3.50.1"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"QNRF-Qatar National Research Fund","award":["NPRP11S-0109-180242 and GSRA6-1-0528-19046"],"award-info":[{"award-number":["NPRP11S-0109-180242 and GSRA6-1-0528-19046"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2021,1,31]]},"abstract":"<jats:p>Universal Serial Bus (USB) Flash Drives are nowadays one of the most convenient and diffused means to transfer files, especially when no Internet connection is available. However, USB flash drives are also one of the most common attack vectors used to gain unauthorized access to host devices. For instance, it is possible to replace a USB drive so that when the USB key is connected, it would install passwords stealing tools, root-kit software, and other disrupting malware. In such a way, an attacker can steal sensitive information via the USB-connected devices, as well as inject any kind of malicious software into the host.<\/jats:p>\n          <jats:p>To thwart the above-cited raising threats, we propose MAGNETO, an efficient, non-interactive, and privacy-preserving framework to verify the authenticity of a USB flash drive, rooted in the analysis of its unintentional magnetic emissions. We show that the magnetic emissions radiated during boot operations on a specific host are unique for each device, and sufficient to uniquely fingerprint both the brand and the model of the USB flash drive, or the specific USB device, depending on the used equipment. Our investigation on 59 different USB flash drives\u2014belonging to 17 brands, including the top brands purchased on Amazon in mid-2019\u2014reveals a minimum classification accuracy of 98.2% in the identification of both brand and model, accompanied by a negligible time and computational overhead. MAGNETO can also identify the specific USB Flash drive, with a minimum classification accuracy of 91.2%. Overall, MAGNETO proves that unintentional magnetic emissions can be considered as a viable and reliable means to fingerprint read-only USB flash drives. Finally, future research directions in this domain are also discussed.<\/jats:p>","DOI":"10.1145\/3422308","type":"journal-article","created":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T18:26:48Z","timestamp":1607365608000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["MAGNETO"],"prefix":"10.1145","volume":"20","author":[{"given":"Omar Adel","family":"Ibrahim","sequence":"first","affiliation":[{"name":"Hamad Bin Khalifa University, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0974-3639","authenticated-orcid":false,"given":"Savio","family":"Sciancalepore","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, Qatar"}]},{"given":"Gabriele","family":"Oligeri","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, Qatar"}]},{"given":"Roberto Di","family":"Pietro","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2020,12,7]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Aaronia. 2020. PBS2 EMC Probe. Retrieved from http:\/\/tinyurl.com\/y4jojj9j.  Aaronia. 2020. PBS2 EMC Probe. Retrieved from http:\/\/tinyurl.com\/y4jojj9j."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the Wireless Telecommunications Symposium. 1--5.","author":"Acharya S. P."},{"key":"e_1_2_1_3_1","unstructured":"Amazon. 2020. Best Sellers in USB Flash Drives. Retrieved from https:\/\/tinyurl.com\/y6sq85sc.  Amazon. 2020. Best Sellers in USB Flash Drives. Retrieved from https:\/\/tinyurl.com\/y6sq85sc."},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 25th USENIX Security Symposium. 397--414","author":"Angel S."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS\u201914)","author":"Bates A."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2561902"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of Atmospheric Propagation VI","volume":"7324","author":"Bole K."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2503308.2188387"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security. 163--177","author":"Camurati G."},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 1149--1170","author":"Cheng Y."},{"key":"e_1_2_1_11_1","unstructured":"C. Cimpanu. 2019. Ships infected with ransomware USB malware worms. Retrieved from https:\/\/www.zdnet.com\/article\/ships-infected-with-ransomware-usb-malware-worms\/.  C. Cimpanu. 2019. Ships infected with ransomware USB malware worms. Retrieved from https:\/\/www.zdnet.com\/article\/ships-infected-with-ransomware-usb-malware-worms\/."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the Military Communications Conference. 2168--2173","author":"Cobb William E."},{"key":"e_1_2_1_13_1","unstructured":"CRI-Lab. 2019. MAGNETO source code and data. Retrieved from https:\/\/cri-lab.net\/usb-fingerprinting.  CRI-Lab. 2019. MAGNETO source code and data. Retrieved from https:\/\/cri-lab.net\/usb-fingerprinting."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 346--363","author":"DeJean G."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the IEEE Military Communications Conference. 1--6.","author":"Dubendorfer C. K."},{"key":"e_1_2_1_16_1","unstructured":"Essencore. 2020. Klevv Neo C20 16GB. Retrieved from https:\/\/tinyurl.com\/ya6v9avv.  Essencore. 2020. Klevv Neo C20 16GB. Retrieved from https:\/\/tinyurl.com\/ya6v9avv."},{"key":"e_1_2_1_17_1","first-page":"2009","article-title":"Code of Federal Regulations","volume":"47","author":"Federal Communications Commission (FCC).","year":"2019","journal-title":"Title"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the Annual Conference on Privacy, Security and Trust (PST\u201916)","author":"Griscioli F."},{"key":"e_1_2_1_19_1","unstructured":"Hack5. 2020. Rubber Ducky. Retrieved from https:\/\/shop.hak5.org\/products\/usb-rubber-ducky-deluxe.  Hack5. 2020. Rubber Ducky. Retrieved from https:\/\/shop.hak5.org\/products\/usb-rubber-ducky-deluxe."},{"key":"e_1_2_1_20_1","unstructured":"HP. 2020. HP 64GB x900w. Retrieved from https:\/\/tinyurl.com\/y3sbtutn.  HP. 2020. HP 64GB x900w. Retrieved from https:\/\/tinyurl.com\/y3sbtutn."},{"key":"e_1_2_1_21_1","volume-title":"Texas Instruments","author":"Intel HP","year":"2018"},{"key":"e_1_2_1_22_1","unstructured":"JUANWE. 2020. JUANWE 32GB. Retrieved from https:\/\/tinyurl.com\/y6myw3vq.  JUANWE. 2020. JUANWE 32GB. Retrieved from https:\/\/tinyurl.com\/y6myw3vq."},{"key":"e_1_2_1_23_1","unstructured":"Kingston. 2020. Kingston Data Traveler. Retrieved from https:\/\/tinyurl.com\/y46vehoh.  Kingston. 2020. Kingston Data Traveler. Retrieved from https:\/\/tinyurl.com\/y46vehoh."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2015.2411608"},{"key":"#cr-split#-e_1_2_1_25_1.1","doi-asserted-by":"crossref","unstructured":"C. Lyu J. Peng W. Zhou S. Yang and Y. Liu. 2016. Design of a high speed 360-degree panoramic video acquisition system based on FPGA and USB 3.0. IEEE Sensors J. (2016) 1--1. DOI:10.1109\/JSEN.2016.2628240 10.1109\/JSEN.2016.2628240","DOI":"10.1109\/JSEN.2016.2628240"},{"key":"#cr-split#-e_1_2_1_25_1.2","doi-asserted-by":"crossref","unstructured":"C. Lyu J. Peng W. Zhou S. Yang and Y. Liu. 2016. Design of a high speed 360-degree panoramic video acquisition system based on FPGA and USB 3.0. IEEE Sensors J. (2016) 1--1. DOI:10.1109\/JSEN.2016.2628240","DOI":"10.1109\/JSEN.2016.2628240"},{"key":"e_1_2_1_26_1","unstructured":"MOSDART. 2020. MOSDART 8GB. Retrieved from https:\/\/tinyurl.com\/y6o29fv2.  MOSDART. 2020. MOSDART 8GB. Retrieved from https:\/\/tinyurl.com\/y6o29fv2."},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the Workshop on Offensive Technologies (WOOT\u201912)","author":"Mulliner C."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.002"},{"key":"e_1_2_1_29_1","unstructured":"K. Nohl and J. Lell. 2014. BadUSB\u2014On accessories that turn evil. In Black Hat USA.  K. Nohl and J. Lell. 2014. BadUSB\u2014On accessories that turn evil. In Black Hat USA."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the IEEE Symposium on Technologies for Homeland Security (HST\u201916)","author":"Noyes D."},{"key":"e_1_2_1_31_1","unstructured":"Null Byte. 2015. Make Your Own Bad USB. Retrieved from https:\/\/null-byte.wonderhowto.com\/how-to\/make-your-own-bad-usb-0165419\/.  Null Byte. 2015. Make Your Own Bad USB. Retrieved from https:\/\/null-byte.wonderhowto.com\/how-to\/make-your-own-bad-usb-0165419\/."},{"key":"e_1_2_1_32_1","unstructured":"Patriot. 2020. Patriot 128GB Supersonic Rage Series. Retrieved from https:\/\/tinyurl.com\/yxuvjsnm.  Patriot. 2020. Patriot 128GB Supersonic Rage Series. Retrieved from https:\/\/tinyurl.com\/yxuvjsnm."},{"key":"e_1_2_1_33_1","volume-title":"Phison Consumer Solutions."},{"key":"e_1_2_1_34_1","unstructured":"PNY. 2020. PNY Turbo 128GB. Retrieved from https:\/\/tinyurl.com\/y249c4dd.  PNY. 2020. PNY Turbo 128GB. Retrieved from https:\/\/tinyurl.com\/y249c4dd."},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the Progress in Electromagnetic Research Symposium (PIERS\u201916)","author":"Przesmycki R."},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the Global Communications Conference (GLOBECOM\u201912)","author":"Ramsey B."},{"key":"e_1_2_1_37_1","unstructured":"Samsung. 2020. Samsung BAR. Retrieved from https:\/\/tinyurl.com\/y3dxrfl2.  Samsung. 2020. Samsung BAR. Retrieved from https:\/\/tinyurl.com\/y3dxrfl2."},{"key":"e_1_2_1_38_1","unstructured":"SanDisk. 2020. SanDisk 128GB Ultra Fit. Retrieved from https:\/\/tinyurl.com\/y2p6y3jy.  SanDisk. 2020. SanDisk 128GB Ultra Fit. Retrieved from https:\/\/tinyurl.com\/y2p6y3jy."},{"key":"e_1_2_1_39_1","unstructured":"SanDisk. 2020. SanDisk Cruzer. Retrieved from https:\/\/tinyurl.com\/y4gs24ha.  SanDisk. 2020. SanDisk Cruzer. Retrieved from https:\/\/tinyurl.com\/y4gs24ha."},{"key":"e_1_2_1_40_1","unstructured":"SanDisk. 2020. SanDisk Cruzer 128GB. Retrieved from https:\/\/tinyurl.com\/y6ghcray.  SanDisk. 2020. SanDisk Cruzer 128GB. Retrieved from https:\/\/tinyurl.com\/y6ghcray."},{"key":"e_1_2_1_41_1","unstructured":"SanDisk. 2020. SanDisk Cruzer Glide 16 GB. Retrieved from https:\/\/tinyurl.com\/ydhtuo3c.  SanDisk. 2020. SanDisk Cruzer Glide 16 GB. Retrieved from https:\/\/tinyurl.com\/ydhtuo3c."},{"key":"e_1_2_1_42_1","unstructured":"SanDisk. 2020. SanDisk Cruzer Glide CZ60. Retrieved from https:\/\/tinyurl.com\/y2q669zm.  SanDisk. 2020. SanDisk Cruzer Glide CZ60. Retrieved from https:\/\/tinyurl.com\/y2q669zm."},{"key":"e_1_2_1_43_1","unstructured":"SearchSecurity. 2019. USB attacks: Big threats to ICS from small devices. Retrieved from https:\/\/searchsecurity.techtarget.com\/feature\/USB-attacks-Big-threats-to-ICS-from-small-devices.  SearchSecurity. 2019. USB attacks: Big threats to ICS from small devices. Retrieved from https:\/\/searchsecurity.techtarget.com\/feature\/USB-attacks-Big-threats-to-ICS-from-small-devices."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2009.03.003"},{"key":"e_1_2_1_45_1","unstructured":"Silicon Power. 2020. Silicon Power Blaze B30. Retrieved from https:\/\/tinyurl.com\/y6gvtxfg.  Silicon Power. 2020. Silicon Power Blaze B30. Retrieved from https:\/\/tinyurl.com\/y6gvtxfg."},{"key":"e_1_2_1_46_1","unstructured":"Strontium. 2020. Strontium Pollex Flash Drive. Retrieved from https:\/\/tinyurl.com\/y86z8rys.  Strontium. 2020. Strontium Pollex Flash Drive. Retrieved from https:\/\/tinyurl.com\/y86z8rys."},{"key":"e_1_2_1_47_1","first-page":"3","article-title":"Radio frequency fingerprinting commercial communication devices to enhance electronic security","volume":"1","author":"Suski W.","year":"2008","journal-title":"Int. J. Electron. Secur. Digit. Forensic"},{"key":"e_1_2_1_48_1","volume-title":"Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201919)","author":"Suzaki K."},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the 31st Annual Computer Security Applications Conference. 261--270","author":"Tian D. J."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241127"},{"key":"e_1_2_1_51_1","unstructured":"Toshiba. 2020. Toshiba 64GB TransMemory. Retrieved from https:\/\/tinyurl.com\/y4r6wg4w.  Toshiba. 2020. Toshiba 64GB TransMemory. Retrieved from https:\/\/tinyurl.com\/y4r6wg4w."},{"key":"e_1_2_1_52_1","unstructured":"Transparency Market Research. 2017. Global USB 3.0 Flash Drives Market. Retrieved from https:\/\/www.transparencymarketresearch.com\/pressrelease\/global-usb-flash-drives-market-size.htm.  Transparency Market Research. 2017. Global USB 3.0 Flash Drives Market. Retrieved from https:\/\/www.transparencymarketresearch.com\/pressrelease\/global-usb-flash-drives-market-size.htm."},{"key":"e_1_2_1_53_1","first-page":"1","article-title":"Intrinsic physical-layer authentication of integrated circuits","volume":"7","author":"Cobb W.","year":"2012","journal-title":"IEEE Trans. Info. Forens. Secur."}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422308","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422308"}},"subtitle":["Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions"],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1,31]]}},"alternative-id":["10.1145\/3422308"],"URL":"https:\/\/doi.org\/10.1145\/3422308","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}