{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T22:57:30Z","timestamp":1774047450267,"version":"3.50.1"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"China NSFC","award":["61925109, 62071428, 61941120"],"award-info":[{"award-number":["61925109, 62071428, 61941120"]}]},{"DOI":"10.13039\/501100004731","name":"ZJNSF","doi-asserted-by":"crossref","award":["LGG19F020020"],"award-info":[{"award-number":["LGG19F020020"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"crossref"}]},{"name":"CPSF","award":["BX2021158"],"award-info":[{"award-number":["BX2021158"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2022,5,31]]},"abstract":"<jats:p>\n            With the widespread use of smart devices, device authentication has received much attention. One popular method for device authentication is to utilize internally measured device fingerprints, such as device ID, software or hardware-based characteristics. In this article, we propose\n            <jats:monospace>DeMiCPU<\/jats:monospace>\n            , a stimulation-response-based device fingerprinting technique that relies on externally measured information, i.e., magnetic induction (MI) signals emitted from the CPU module that consists of the CPU chip and its affiliated power-supply circuits. The key insight of\n            <jats:monospace>DeMiCPU<\/jats:monospace>\n            is that hardware discrepancies essentially exist among CPU modules and thus the corresponding MI signals make promising device fingerprints, which are difficult to be modified or mimicked. We design a stimulation and a discrepancy extraction scheme and evaluate them with 90 mobile devices, including 70 laptops (among which 30 are of totally identical CPU and operating system) and 20 smartphones. The results show that\n            <jats:monospace>DeMiCPU<\/jats:monospace>\n            can achieve 99.7% precision and recall on average, and 99.8% precision and recall for the 30 identical devices, with a fingerprinting time of 0.6~s. The performance can be further improved to 99.9% with multi-round fingerprinting. In addition, we implement a prototype of\n            <jats:monospace>DeMiCPU<\/jats:monospace>\n            docker, which can effectively reduce the requirement of test points and enlarge the fingerprinting area.\n          <\/jats:p>","DOI":"10.1145\/3495158","type":"journal-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T19:42:59Z","timestamp":1640115779000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules"],"prefix":"10.1145","volume":"18","author":[{"given":"Xiaoyu","family":"Ji","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, CN"}]},{"given":"Yushi","family":"Cheng","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, CN"}]},{"given":"Juchuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, CN"}]},{"given":"Yuehan","family":"Chi","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, CN"}]},{"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, CN"}]},{"given":"Yi-Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, CN"}]}],"member":"320","published-online":{"date-parts":[[2021,12,21]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2808455"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1977.1162950"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.3390\/s16060818"},{"key":"e_1_3_1_5_2","unstructured":"Steven M. Bellovin and Michael Merritt. 1993. Cryptographic protocol for secure communications. US Patent 5 241 599."},{"key":"e_1_3_1_6_2","article-title":"Mobile device identification via sensor fingerprinting","author":"Bojinov Hristo","year":"2014","unstructured":"Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. Arxiv Preprint arXiv:1408.1416.","journal-title":"Arxiv Preprint arXiv:1408.1416"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931065"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2015.7256162"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.39"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2015.7146508"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329817"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339810"},{"key":"e_1_3_1_14_2","first-page":"199","volume-title":"Apec","author":"Cleveland Terry L.","year":"2005","unstructured":"Terry L. Cleveland. 2005. Bi-directional power system for laptop computers. In Apec, Vol. 1. IEEE, 199\u2013203."},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660325"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352542"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23059"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.926987"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.5555\/1267336.1267348"},{"key":"e_1_3_1_20_2","volume-title":"Gartner Forecasts Flat Worldwide Device Shipments Until 2018","year":"2017","unstructured":"Gartner. 2017. Gartner Forecasts Flat Worldwide Device Shipments Until 2018. Retrieved from http:\/\/www.gartner.com\/newsroom\/id\/3560517."},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"e_1_3_1_22_2","article-title":"Understanding and eliminating EMI in microcontroller applications","author":"Getz Robin","year":"1996","unstructured":"Robin Getz and Bob Moeckel. 1996. Understanding and eliminating EMI in microcontroller applications. Nat. Semicond.","journal-title":"Nat. Semicond."},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6226-1"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.5555\/648120.747060"},{"key":"e_1_3_1_25_2","first-page":"1","article-title":"Radio frequency fingerprinting for intrusion detection in wireless networks","volume":"12","author":"Hall Jeyanthi","year":"2005","unstructured":"Jeyanthi Hall, Michel Barbeau, and Evangelos Kranakis. 2005. Radio frequency fingerprinting for intrusion detection in wireless networks. IEEE Trans. Defend. Sec. Comput. 12 (2005), 1\u201335.","journal-title":"IEEE Trans. Defend. Sec. Comput."},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134081"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_19"},{"key":"e_1_3_1_28_2","volume-title":"Integrated Fluxgate Magnetic Sensor IC for Open-loop Applications","author":"Instrument Texas","year":"2016","unstructured":"Texas Instrument. 2016. Integrated Fluxgate Magnetic Sensor IC for Open-loop Applications. Retrieved from https:\/\/www.ti.com\/product\/DRV425."},{"key":"e_1_3_1_29_2","volume-title":"MSP430F5529 LaunchPad Development Kit","author":"Instruments Texas","year":"2017","unstructured":"Texas Instruments. 2017. MSP430F5529 LaunchPad Development Kit. Retrieved from http:\/\/www.ti.com\/lit\/ug\/slau533d\/slau533d.pdf."},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.628674"},{"key":"e_1_3_1_31_2","volume-title":"U2541A 250kSa\/s USB Modular Simultaneous Data Acquisition","year":"2017","unstructured":"Keysight. 2017. U2541A 250kSa\/s USB Modular Simultaneous Data Acquisition. Retrieved from https:\/\/tinyurl.com\/yb5r768y."},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-019-00074-w"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/WESCON.1993.488465"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807481"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.5555\/1924920.1924921"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2003.1196115"},{"key":"e_1_3_1_39_2","unstructured":"Ron Mondri and Sara Bitan. 2009. Inspected secure communication protocol. US Patent 7 584 505."},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080223"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.01.006"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117824"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECON52354.2021.9491601"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287866"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369033"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2000.895399"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2005.1577145"},{"key":"e_1_3_1_48_2","volume-title":"Windows Internals","author":"Solomon David A.","year":"2009","unstructured":"David A. Solomon, Mark E. Russinovich, and Alex Ionescu. 2009. Windows Internals. Microsoft Press."},{"key":"e_1_3_1_49_2","first-page":"475","volume-title":"Proceedings of the IEEE International Conference on Web Services (ICWS\u201916)","author":"Stone Barron","year":"2016","unstructured":"Barron Stone and Samuel Stone. 2016. Comparison of radio frequency based techniques for device discrimination and operation identification. In Proceedings of the IEEE International Conference on Web Services (ICWS\u201916). 475."},{"key":"e_1_3_1_50_2","volume-title":"Proceedings of the 4th International Conference on Electrical and Electronics Engineering (ICEEE\u201905)","author":"Suleiman D.","year":"2005","unstructured":"D. Suleiman, M. Ibrahim, and I. Hamarash. 2005. Dynamic voltage frequency scaling (DVFS) for microprocessors power and energy reduction. In Proceedings of the 4th International Conference on Electrical and Electronics Engineering (ICEEE\u201905)."},{"key":"e_1_3_1_51_2","unstructured":"Matthew Travers. 2015. CPU power consumption experiments and results analysis of Intel i7-4820K. Newcastle University Newcastle"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682720"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2007.364330"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30806-7_7"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804271"},{"key":"e_1_3_1_56_2","volume-title":"Amp\u00e9re\u2019s Circuital Law","year":"2018","unstructured":"Wikipedia. 2018. Amp\u00e9re\u2019s Circuital Law. Retrieved from https:\/\/en.wikipedia.org\/wiki\/AmpC3A8re27s_circuital_law."},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7439(87)80084-9"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3068776"},{"key":"e_1_3_1_59_2","volume-title":"Proceedings of the 19th Network and Distributed System Security Symposium (NDSS\u201912)","author":"Yen Ting-Fang","year":"2012","unstructured":"Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, and Martin Abadi. 2012. Host fingerprinting and tracking on the web: Privacy and security implications. In Proceedings of the 19th Network and Distributed System Security Symposium (NDSS\u201912)."},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155386"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024572"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737572"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660300"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196521"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2016.10.017"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3495158","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3495158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:02Z","timestamp":1750191122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3495158"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,21]]},"references-count":65,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,5,31]]}},"alternative-id":["10.1145\/3495158"],"URL":"https:\/\/doi.org\/10.1145\/3495158","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,21]]},"assertion":[{"value":"2021-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}