{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:00:28Z","timestamp":1769922028960,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T00:00:00Z","timestamp":1635984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,10]]},"DOI":"10.1145\/3484266.3487388","type":"proceedings-article","created":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T22:31:15Z","timestamp":1636065075000},"page":"178-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["HarvestPrint"],"prefix":"10.1145","author":[{"given":"Revathy","family":"Narayanan","sequence":"first","affiliation":[{"name":"Networked Systems Security Group KTH Royal Institute of Technology"}]},{"given":"Ambuj","family":"Varshney","sequence":"additional","affiliation":[{"name":"Networked Systems Security Group KTH Royal Institute of Technology"}]},{"given":"Panos","family":"Papadimitratos","sequence":"additional","affiliation":[{"name":"Networked Systems Security Group KTH Royal Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2021,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428329"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405866"},{"key":"e_1_3_2_1_3_1","volume-title":"10kHz to 1MHz Resistor Set Oscillator in SOT-23","author":"Devices Analog","year":"2021","unstructured":"Analog Devices . Micropower , 10kHz to 1MHz Resistor Set Oscillator in SOT-23 , 2021 . Analog Devices. Micropower, 10kHz to 1MHz Resistor Set Oscillator in SOT-23, 2021."},{"key":"e_1_3_2_1_4_1","volume-title":"DelFin: A deep learning based CSI fingerprinting indoor localization in IoT context","author":"Berruet B.","year":"2018","unstructured":"B. Berruet , O. Baala , A. Caminada , and V. Guillet . DelFin: A deep learning based CSI fingerprinting indoor localization in IoT context . In IEEE IPIN , 2018 . B. Berruet, O. Baala, A. Caminada, and V. Guillet. DelFin: A deep learning based CSI fingerprinting indoor localization in IoT context. In IEEE IPIN, 2018."},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX NSDI","author":"Chen X.","year":"2020","unstructured":"X. Chen , J. Liu , X. Wang , H. Liu , D. Jiang , and L. Chen . Eingerprint: Robust energy-related fingerprinting for passive RFID tags . In USENIX NSDI , 2020 . X. Chen, J. Liu, X. Wang, H. Liu, D. Jiang, and L. Chen. Eingerprint: Robust energy-related fingerprinting for passive RFID tags. In USENIX NSDI, 2020."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3448622"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098845"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2430281"},{"issue":"2","key":"e_1_3_2_1_9_1","volume":"24","author":"Han J.","year":"2016","unstructured":"J. Han , C. Qian , P. Yang , D. Ma , Z. Jiang , W. Xi , and J. Zhao . Geneprint: Generic and accurate physical-layer identification for UHF RFID tags. IEEE\/ACM Transactions on Networking , 24 ( 2 ), 2016 . J. Han, C. Qian, P. Yang, D. Ma, Z. Jiang, W. Xi, and J. Zhao. Geneprint: Generic and accurate physical-layer identification for UHF RFID tags. IEEE\/ACM Transactions on Networking, 24(2), 2016.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287044"},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX NSDI","author":"Hessar M.","year":"2019","unstructured":"M. Hessar , A. Najafi , and S. Gollakota . Netscatter: Enabling large-scale backscatter networks . In USENIX NSDI , 2019 . M. Hessar, A. Najafi, and S. Gollakota. Netscatter: Enabling large-scale backscatter networks. In USENIX NSDI, 2019."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934894"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342091"},{"key":"e_1_3_2_1_14_1","volume-title":"RFID security and privacy: A research survey","author":"Juels A.","year":"2006","unstructured":"A. Juels . RFID security and privacy: A research survey . IEEE journal on selected areas in communications, 24(2):381--394, 2006 . A. Juels. RFID security and privacy: A research survey. IEEE journal on selected areas in communications, 24(2):381--394, 2006."},{"key":"e_1_3_2_1_15_1","volume-title":"PASSIVE WI-FI: Bringing low power to Wi-Fi transmissions. GetMobile: Mobile Computing and Communications, 20(3)","author":"Kellogg B.","year":"2017","unstructured":"B. Kellogg , V. Talla , J. R. Smith , and S. Gollakot . PASSIVE WI-FI: Bringing low power to Wi-Fi transmissions. GetMobile: Mobile Computing and Communications, 20(3) , 2017 . B. Kellogg, V. Talla, J. R. Smith, and S. Gollakot. PASSIVE WI-FI: Bringing low power to Wi-Fi transmissions. GetMobile: Mobile Computing and Communications, 20(3), 2017."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933242"},{"key":"e_1_3_2_1_17_1","author":"Li X.","year":"2021","unstructured":"X. Li , M. Zhao , M. Zeng , S. Mumtaz , V. G. Menon , Z. Ding , and O. A. Dobre . Hardware impaired ambient backscatter noma systems: Reliability and security. IEEE\/ACM Transactions on Communications , 2021 . X. Li, M. Zhao, M. Zeng, S. Mumtaz, V. G. Menon, Z. Ding, and O. A. Dobre. Hardware impaired ambient backscatter noma systems: Reliability and security. IEEE\/ACM Transactions on Communications, 2021.","journal-title":"IEEE\/ACM Transactions on Communications"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom45495.2020.9127375"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737455"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486015"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274783.3274841"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3266002"},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX NSDI","author":"Naderiparizi S.","year":"2018","unstructured":"S. Naderiparizi , M. Hessar , V. Talla , S. Gollakota , and J. R. Smith . Towards battery-free HD video streaming . In USENIX NSDI , 2018 . S. Naderiparizi, M. Hessar, V. Talla, S. Gollakota, and J. R. Smith. Towards battery-free HD video streaming. In USENIX NSDI, 2018."},{"issue":"6","key":"e_1_3_2_1_24_1","volume":"8","author":"Periaswamy S. C. G.","year":"2010","unstructured":"S. C. G. Periaswamy , D. R. Thompson , and J. Di . Fingerprinting RFID tags. IEEE Transactions on Dependable and Secure Computing , 8 ( 6 ), 2010 . S. C. G. Periaswamy, D. R. Thompson, and J. Di. Fingerprinting RFID tags. IEEE Transactions on Dependable and Secure Computing, 8(6), 2010.","journal-title":"Fingerprinting RFID tags. IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.051414.130478"},{"key":"e_1_3_2_1_26_1","volume-title":"Radio frequency fingerprint identification for lora using spectrogram and cnn. arXiv preprint arXiv:2101.01668","author":"Shen G.","year":"2020","unstructured":"G. Shen , J. Zhang , A. Marshall , L. Peng , and X. Wang . Radio frequency fingerprint identification for lora using spectrogram and cnn. arXiv preprint arXiv:2101.01668 , 2020 . G. Shen, J. Zhang, A. Marshall, L. Peng, and X. Wang. Radio frequency fingerprint identification for lora using spectrogram and cnn. arXiv preprint arXiv:2101.01668, 2020."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130970"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3090090"},{"key":"e_1_3_2_1_29_1","volume-title":"MSP430FR59xx Mixed-Signal Microcontrollers","author":"Instruments Texas","year":"2014","unstructured":"Texas Instruments . MSP430FR59xx Mixed-Signal Microcontrollers , 2014 . Texas Instruments. MSP430FR59xx Mixed-Signal Microcontrollers, 2014."},{"key":"e_1_3_2_1_30_1","volume-title":"CC1310 SimpleLink\u2122 Ultra-Low-Power Sub-1 GHz Wireless MCU for energy harvester powered applications","author":"Instruments Texas","year":"2018","unstructured":"Texas Instruments . CC1310 SimpleLink\u2122 Ultra-Low-Power Sub-1 GHz Wireless MCU for energy harvester powered applications , 2018 . Texas Instruments. CC1310 SimpleLink\u2122 Ultra-Low-Power Sub-1 GHz Wireless MCU for energy harvester powered applications, 2018."},{"key":"e_1_3_2_1_31_1","volume-title":"BQ25570 nano power boost charger and buck converter for energy harvester powered applications","author":"Instruments Texas","year":"2019","unstructured":"Texas Instruments . BQ25570 nano power boost charger and buck converter for energy harvester powered applications , 2019 . Texas Instruments. BQ25570 nano power boost charger and buck converter for energy harvester powered applications, 2019."},{"key":"e_1_3_2_1_32_1","volume-title":"ACM SENSYS","author":"Varshney A.","year":"2017","unstructured":"A. Varshney , O. Harms , C. P\u00e9rez-Penichet , C. Rohner , F. Hermans , and T. Voigt . Lorea: A backscatter architecture that achieves a long communication range . In ACM SENSYS , 2017 . A. Varshney, O. Harms, C. P\u00e9rez-Penichet, C. Rohner, F. Hermans, and T. Voigt. Lorea: A backscatter architecture that achieves a long communication range. In ACM SENSYS, 2017."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3129881.3129890"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345451"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230565"},{"issue":"6","key":"e_1_3_2_1_36_1","volume":"3","author":"Wang X.","year":"2016","unstructured":"X. Wang , L. Gao , and S. Mao . CSI phase fingerprinting for indoor localization with a deep learning approach. IEEE Internet of Things Journal , 3 ( 6 ), 2016 . X. Wang, L. Gao, and S. Mao. CSI phase fingerprinting for indoor localization with a deep learning approach. IEEE Internet of Things Journal, 3(6), 2016.","journal-title":"IEEE Internet of Things Journal"},{"issue":"11","key":"e_1_3_2_1_37_1","volume":"15","author":"Yang Q.","year":"2016","unstructured":"Q. Yang , H.-M. Wang , Y. Zhang , and Z. Han . Physical layer security in MIMO backscatter wireless systems. IEEE Transactions on Wireless Communications , 15 ( 11 ), 2016 . Q. Yang, H.-M. Wang, Y. Zhang, and Z. Han. Physical layer security in MIMO backscatter wireless systems. IEEE Transactions on Wireless Communications, 15(11), 2016.","journal-title":"Physical layer security in MIMO backscatter wireless systems. IEEE Transactions on Wireless Communications"},{"key":"e_1_3_2_1_38_1","first-page":"353","author":"Zanetti D.","year":"2010","unstructured":"D. Zanetti , B. Danev , and S. Capkun . Physical-layer identification of UHF RFID tags. In ACM MobiCom, page 353 - 364 , 2010 . D. Zanetti, B. Danev, and S. Capkun. Physical-layer identification of UHF RFID tags. In ACM MobiCom, page 353-364, 2010.","journal-title":"Physical-layer identification of UHF RFID tags. In ACM MobiCom, page"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934901"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737419"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300121"}],"event":{"name":"HotNets '21: The 20th ACM Workshop on Hot Topics in Networks","location":"Virtual Event United Kingdom","acronym":"HotNets '21","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Twentieth ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484266.3487388","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3484266.3487388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:13Z","timestamp":1750191433000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484266.3487388"}},"subtitle":["Securing Battery-free Backscatter Tags through Fingerprinting"],"short-title":[],"issued":{"date-parts":[[2021,11,4]]},"references-count":41,"alternative-id":["10.1145\/3484266.3487388","10.1145\/3484266"],"URL":"https:\/\/doi.org\/10.1145\/3484266.3487388","relation":{},"subject":[],"published":{"date-parts":[[2021,11,4]]},"assertion":[{"value":"2021-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}