{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T22:58:05Z","timestamp":1774047485436,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["GSRA6-1-0528-19046"],"award-info":[{"award-number":["GSRA6-1-0528-19046"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.1145\/3558482.3590198","type":"proceedings-article","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T16:10:08Z","timestamp":1687968608000},"page":"305-316","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0171-8757","authenticated-orcid":false,"given":"Omar Adel","family":"Ibrahim","sequence":"first","affiliation":[{"name":"Hamad Bin Khalifa University (HBKU), Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1909-0336","authenticated-orcid":false,"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University (HBKU), Doha, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2023,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International workshop on cryptographic hardware and embedded systems. Springer, 29--45","author":"Agrawal Dakshi","year":"2002","unstructured":"Dakshi Agrawal , Bruce Archambeault , Josyula R Rao , and Pankaj Rohatgi . 2002 . The EM side-channel (s) . In International workshop on cryptographic hardware and embedded systems. Springer, 29--45 . Dakshi Agrawal, Bruce Archambeault, Josyula R Rao, and Pankaj Rohatgi. 2002. The EM side-channel (s). In International workshop on cryptographic hardware and embedded systems. Springer, 29--45."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2561902"},{"key":"e_1_3_2_1_3_1","volume-title":"Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. In ACM CCS","author":"G.","unstructured":"Camurati, G. et al. 2018 . Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. In ACM CCS ( Toronto, Canada). 163--177. Camurati, G. et al. 2018. Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. In ACM CCS (Toronto, Canada). 163--177."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849324"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339810"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680487"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160170"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379782"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2871465"},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE Military Communications Conference. 1--6.","author":"Dubendorfer C. K.","unstructured":"C. K. Dubendorfer , B. W. Ramsey , and M. A. Temple . 2012. An RF-DNA verification process for ZigBee networks . In IEEE Military Communications Conference. 1--6. C. K. Dubendorfer, B. W. Ramsey, and M. A. Temple. 2012. An RF-DNA verification process for ZigBee networks. In IEEE Military Communications Conference. 1--6."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988558"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2978620"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3001721"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2015.2496143"},{"key":"e_1_3_2_1_15_1","unstructured":"Omar Ibrahim and Roberto Di Pietro. 2023. MagAuth Data. Available at https:\/\/tinyurl.com\/MagAuth (Accessed: 13-04--2023).  Omar Ibrahim and Roberto Di Pietro. 2023. MagAuth Data. Available at https:\/\/tinyurl.com\/MagAuth (Accessed: 13-04--2023)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3529656"},{"key":"e_1_3_2_1_17_1","volume-title":"MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT. In Security and Privacy in Communication Networks: 18th EAI International Conference (SecureComm `22)","author":"Ibrahim Omar Adel","year":"2023","unstructured":"Omar Adel Ibrahim , Savio Sciancalepore , and Roberto Di Pietro . 2023 . MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT. In Security and Privacy in Communication Networks: 18th EAI International Conference (SecureComm `22) , Virtual Event , October 2022. Springer, 130--149. Omar Adel Ibrahim, Savio Sciancalepore, and Roberto Di Pietro. 2023. MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT. In Security and Privacy in Communication Networks: 18th EAI International Conference (SecureComm `22), Virtual Event, October 2022. Springer, 130--149."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422308"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3315669"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495158"},{"key":"e_1_3_2_1_21_1","volume-title":"Robert Locke Callan, Arie Yeredor, Milos Prvulovic, and Alenka Zajic.","author":"Khan Haider Adnan","year":"2019","unstructured":"Haider Adnan Khan , Nader Sehatbakhsh , Luong Ngoc Nguyen , Robert Locke Callan, Arie Yeredor, Milos Prvulovic, and Alenka Zajic. 2019 . IDEA : Intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems. IEEE TDSC ( 2019). Haider Adnan Khan, Nader Sehatbakhsh, Luong Ngoc Nguyen, Robert Locke Callan, Arie Yeredor, Milos Prvulovic, and Alenka Zajic. 2019. IDEA: Intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems. IEEE TDSC (2019)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2015.2411608"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2908759"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913759"},{"key":"e_1_3_2_1_25_1","volume-title":"Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification. In Annual Computer Security Applications Conference. 706--719","author":"Pham Duy-Phuc","year":"2021","unstructured":"Duy-Phuc Pham , Damien Marion , Matthieu Mastio , and Annelie Heuser . 2021 . Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification. In Annual Computer Security Applications Conference. 706--719 . Duy-Phuc Pham, Damien Marion, Matthieu Mastio, and Annelie Heuser. 2021. Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification. In Annual Computer Security Applications Conference. 706--719."},{"key":"e_1_3_2_1_26_1","volume-title":"Global Communications Conference (GLOBECOM). IEEE, 795--800","author":"Ramsey B.","unstructured":"B. Ramsey , M. Temple , and B. Mullins . 2012. PHY foundation for multi-factor ZigBee node authentication . In Global Communications Conference (GLOBECOM). IEEE, 795--800 . B. Ramsey, M. Temple, and B. Mullins. 2012. PHY foundation for multi-factor ZigBee node authentication. In Global Communications Conference (GLOBECOM). IEEE, 795--800."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2012.6362777"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962626"},{"key":"e_1_3_2_1_29_1","volume-title":"Remote Monitoring and Propagation Modeling of EM Side-Channel Signals for IoT Device Security. In 2020 14th European Conference on Antennas and Propagation (EuCAP). IEEE, 1--5.","author":"Sangodoyin S.","unstructured":"S. Sangodoyin , F. Werner , B. B Yilmaz , C. Cheng , E. Ugurlu , N. Sehatbakhsh , M. Prvulovic , and A. Zaji\u0107 . 2020 . Remote Monitoring and Propagation Modeling of EM Side-Channel Signals for IoT Device Security. In 2020 14th European Conference on Antennas and Propagation (EuCAP). IEEE, 1--5. S. Sangodoyin, F. Werner, B. B Yilmaz, C. Cheng, E. Ugurlu, N. Sehatbakhsh, M. Prvulovic, and A. Zaji\u0107. 2020. Remote Monitoring and Propagation Modeling of EM Side-Channel Signals for IoT Device Security. In 2020 14th European Conference on Antennas and Propagation (EuCAP). IEEE, 1--5."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2855665"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358261"},{"key":"e_1_3_2_1_32_1","volume-title":"2020 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 123--138","author":"Sehatbakhsh N.","unstructured":"N. Sehatbakhsh , B.B. Yilmaz , A. Zajic , and M. Prvulovic . 2020. A new side-channel vulnerability on modern computers by exploiting electromagnetic emanations from the power management unit . In 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 123--138 . N. Sehatbakhsh, B.B. Yilmaz, A. Zajic, and M. Prvulovic. 2020. A new side-channel vulnerability on modern computers by exploiting electromagnetic emanations from the power management unit. In 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 123--138."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2020.2968369"},{"key":"e_1_3_2_1_34_1","first-page":"3","article-title":"Radio Frequency Fingerprinting Commercial Communication Devices to Enhance Electronic","volume":"1","author":"Suski W.","year":"2008","unstructured":"W. Suski , M. Temple , M. Mendenhall , and R. Mills . 2008 . Radio Frequency Fingerprinting Commercial Communication Devices to Enhance Electronic Security. Int. J. Electron. Secur. Digit. Forensic , Vol. 1 , 3 (Oct. 2008), 301--322. W. Suski, M. Temple, M. Mendenhall, and R. Mills. 2008. Radio Frequency Fingerprinting Commercial Communication Devices to Enhance Electronic Security. Int. J. Electron. Secur. Digit. Forensic , Vol. 1, 3 (Oct. 2008), 301--322.","journal-title":"Security. Int. J. Electron. Secur. Digit. Forensic"},{"key":"e_1_3_2_1_35_1","first-page":"113","article-title":"Specific emitter identification and verification","volume":"113","author":"Talbot Kenneth I","year":"2003","unstructured":"Kenneth I Talbot , Paul R Duley , and Martin H Hyatt . 2003 . Specific emitter identification and verification . Technology Review , Vol. 113 (2003), 113 -- 130 . Kenneth I Talbot, Paul R Duley, and Martin H Hyatt. 2003. Specific emitter identification and verification. Technology Review , Vol. 113 (2003), 113--130.","journal-title":"Technology Review"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160170"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903444"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3042188"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"},{"key":"e_1_3_2_1_41_1","volume-title":"2022 IEEE Symposium on Security and Privacy. io","author":"Zhan Zihao","year":"2023","unstructured":"Zihao Zhan , Zhenkai Zhang , Sisheng Liang , Fan Yao , and Xenofon Koutsoukos . 2023 . Graphics peeping unit: Exploiting em side-channel information of gpus to eavesdrop on your neighbors . In 2022 IEEE Symposium on Security and Privacy. io Zihao Zhan, Zhenkai Zhang, Sisheng Liang, Fan Yao, and Xenofon Koutsoukos. 2023. Graphics peeping unit: Exploiting em side-channel information of gpus to eavesdrop on your neighbors. In 2022 IEEE Symposium on Security and Privacy. io"}],"event":{"name":"WiSec '23: 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Guildford United Kingdom","acronym":"WiSec '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558482.3590198","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558482.3590198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:08Z","timestamp":1750178828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558482.3590198"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":40,"alternative-id":["10.1145\/3558482.3590198","10.1145\/3558482"],"URL":"https:\/\/doi.org\/10.1145\/3558482.3590198","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]},"assertion":[{"value":"2023-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}