{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:29:54Z","timestamp":1766449794510,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T00:00:00Z","timestamp":1683590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,9]]},"DOI":"10.1145\/3583120.3586959","type":"proceedings-article","created":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T16:23:44Z","timestamp":1683303824000},"page":"288-301","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Everything has its Bad Side and Good Side: Turning Processors to Low Overhead Radios Using Side-Channels"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4723-4808","authenticated-orcid":false,"given":"Justin","family":"Feng","sequence":"first","affiliation":[{"name":"UCLA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5253-2818","authenticated-orcid":false,"given":"Timothy","family":"Jacques","sequence":"additional","affiliation":[{"name":"UCLA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8218-6301","authenticated-orcid":false,"given":"Omid","family":"Abari","sequence":"additional","affiliation":[{"name":"UCLA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7181-2258","authenticated-orcid":false,"given":"Nader","family":"Sehatbakhsh","sequence":"additional","affiliation":[{"name":"UCLA, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365853"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3286062.3286084"},{"volume-title":"Icc 2020-2020 Ieee International Conference On Communications (Icc)","author":"Afisiadis Orion","key":"e_1_3_2_1_3_1","unstructured":"Orion Afisiadis , Andreas Burg , and Alexios Balatsoukas-Stimming . 2020. Coded LoRa frame error rate analysis . In Icc 2020-2020 Ieee International Conference On Communications (Icc) . IEEE , 1\u20136. Orion Afisiadis, Andreas Burg, and Alexios Balatsoukas-Stimming. 2020. Coded LoRa frame error rate analysis. In Icc 2020-2020 Ieee International Conference On Communications (Icc). IEEE, 1\u20136."},{"key":"e_1_3_2_1_4_1","unstructured":"[\n  4\n  ]  Indoor\u00a0TV Antenna. [n. d.]. https:\/\/www.amazon.com\/dp\/B01FUB4ZG8?psc=1&ref=ppx_yo2ov_dt_b_product_details. Accessed: 2022-07.  [4] Indoor\u00a0TV Antenna. [n. d.]. https:\/\/www.amazon.com\/dp\/B01FUB4ZG8?psc=1&ref=ppx_yo2ov_dt_b_product_details. Accessed: 2022-07."},{"key":"e_1_3_2_1_5_1","unstructured":"[\n  5\n  ]  USPR B205mini-i. [n. d.]. https:\/\/www.ettus.com\/all-products\/usrp-b205mini-i\/. Accessed: 2022-07.  [5] USPR B205mini-i. [n. d.]. https:\/\/www.ettus.com\/all-products\/usrp-b205mini-i\/. Accessed: 2022-07."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787490"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750394"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833767"},{"key":"e_1_3_2_1_9_1","unstructured":"Giovanni Camurati Aur\u00e9lien Francillon and Fran\u00e7ois-Xavier Standaert. [n. d.]. Understanding screaming channels: From a detailed analysis to improved attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems ([n. d.]).  Giovanni Camurati Aur\u00e9lien Francillon and Fran\u00e7ois-Xavier Standaert. [n. d.]. Understanding screaming channels: From a detailed analysis to improved attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems ([n. d.])."},{"key":"e_1_3_2_1_10_1","unstructured":"[\n  10\n  ]  TI\u00a0CC2650\u00a0BLE Chip. [n. d.]. https:\/\/www.ti.com\/product\/CC2650\/. Accessed: 2022-07.  [10] TI\u00a0CC2650\u00a0BLE Chip. [n. d.]. https:\/\/www.ti.com\/product\/CC2650\/. Accessed: 2022-07."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3448622"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419200"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683504"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430719"},{"key":"e_1_3_2_1_16_1","volume-title":"AIR-FI: Generating covert wi-fi signals from air-gapped computers. arXiv preprint arXiv:2012.06884","author":"Guri Mordechai","year":"2020","unstructured":"Mordechai Guri . 2020. AIR-FI: Generating covert wi-fi signals from air-gapped computers. arXiv preprint arXiv:2012.06884 ( 2020 ). Mordechai Guri. 2020. AIR-FI: Generating covert wi-fi signals from air-gapped computers. arXiv preprint arXiv:2012.06884 (2020)."},{"key":"e_1_3_2_1_17_1","volume-title":"24th USENIX Security Symposium. 849\u2013864","author":"Guri Mordechai","year":"2015","unstructured":"Mordechai Guri , Assaf Kachlon , Ofer Hasson , Gabi Kedma , Yisroel Mirsky , and Yuval Elovici . 2015 . { GSMem} : Data Exfiltration from { Air-Gapped} Computers over { GSM} Frequencies . In 24th USENIX Security Symposium. 849\u2013864 . Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, and Yuval Elovici. 2015. { GSMem} : Data Exfiltration from { Air-Gapped} Computers over { GSM} Frequencies. In 24th USENIX Security Symposium. 849\u2013864."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2014.6999418"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Han Yi","year":"2022","unstructured":"Yi Han , Matthew Chan , Zahra Aref , Nils\u00a0Ole Tippenhauer , and Saman Zonouz . 2022 . Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring . In Proceedings of the USENIX Security Symposium. Yi Han, Matthew Chan, Zahra Aref, Nils\u00a0Ole Tippenhauer, and Saman Zonouz. 2022. Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134081"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2727985"},{"key":"e_1_3_2_1_22_1","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Hessar Mehrdad","year":"2019","unstructured":"Mehrdad Hessar , Ali Najafi , and Shyamnath Gollakota . 2019 . { NetScatter} : Enabling { Large-Scale} Backscatter Networks . In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) . 271\u2013284. Mehrdad Hessar, Ali Najafi, and Shyamnath Gollakota. 2019. { NetScatter} : Enabling { Large-Scale} Backscatter Networks. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). 271\u2013284."},{"key":"e_1_3_2_1_23_1","unstructured":"[\n  23\n  ]  Adafruit INA219. [n. d.]. https:\/\/www.adafruit.com\/product\/904\/. Accessed: 2022-07.  [23] Adafruit INA219. [n. d.]. https:\/\/www.adafruit.com\/product\/904\/. Accessed: 2022-07."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483261"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626319"},{"key":"e_1_3_2_1_26_1","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Kellogg Bryce","year":"2016","unstructured":"Bryce Kellogg , Vamsi Talla , Shyamnath Gollakota , and Joshua\u00a0 R Smith . 2016 . Passive { Wi-Fi} : Bringing Low Power to { Wi-Fi} Transmissions . In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16) . 151\u2013164. Bryce Kellogg, Vamsi Talla, Shyamnath Gollakota, and Joshua\u00a0R Smith. 2016. Passive { Wi-Fi} : Bringing Low Power to { Wi-Fi} Transmissions. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 151\u2013164."},{"key":"e_1_3_2_1_27_1","first-page":"1","article-title":"Lora networking techniques for large-scale and long-term iot: A down-to-top survey","volume":"55","author":"Li Chenning","year":"2022","unstructured":"Chenning Li and Zhichao Cao . 2022 . Lora networking techniques for large-scale and long-term iot: A down-to-top survey . ACM Computing Surveys (CSUR) 55 , 3 (2022), 1 \u2013 36 . Chenning Li and Zhichao Cao. 2022. Lora networking techniques for large-scale and long-term iot: A down-to-top survey. ACM Computing Surveys (CSUR) 55, 3 (2022), 1\u201336.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485928"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155407"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON48991.2020.9158446"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483256"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2954678"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.034"},{"key":"e_1_3_2_1_34_1","unstructured":"[\n  34\n  ]  TI MSP430. [n. d.]. https:\/\/www.ti.com\/tool\/MSP-EXP430G2ET\/. Accessed: 2022-07.  [34] TI MSP430. [n. d.]. https:\/\/www.ti.com\/tool\/MSP-EXP430G2ET\/. Accessed: 2022-07."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230567"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3417322"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2020.3037659"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2945767"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783762"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00020"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00031"},{"key":"e_1_3_2_1_42_1","volume-title":"An Intelligent Wireless Networking and Application Layer Protocol Design Based on LoRa. In 2021 IEEE 4th International Conference on Electronics Technology (ICET). IEEE, 1099\u20131104","author":"Shuai Pang","year":"2021","unstructured":"Pang Shuai , Zhao Yonghui , and Ouyang Jineng . 2021 . An Intelligent Wireless Networking and Application Layer Protocol Design Based on LoRa. In 2021 IEEE 4th International Conference on Electronics Technology (ICET). IEEE, 1099\u20131104 . Pang Shuai, Zhao Yonghui, and Ouyang Jineng. 2021. An Intelligent Wireless Networking and Application Layer Protocol Design Based on LoRa. In 2021 IEEE 4th International Conference on Electronics Technology (ICET). IEEE, 1099\u20131104."},{"volume-title":"How low energy is bluetooth low energy? comparative measurements with zigbee\/802.15. 4. In 2012 IEEE wireless communications and networking conference workshops (WCNCW)","author":"Siekkinen Matti","key":"e_1_3_2_1_43_1","unstructured":"Matti Siekkinen , Markus Hiienkari , Jukka\u00a0 K Nurminen , and Johanna Nieminen . 2012. How low energy is bluetooth low energy? comparative measurements with zigbee\/802.15. 4. In 2012 IEEE wireless communications and networking conference workshops (WCNCW) . IEEE , 232\u2013237. Matti Siekkinen, Markus Hiienkari, Jukka\u00a0K Nurminen, and Johanna Nieminen. 2012. How low energy is bluetooth low energy? comparative measurements with zigbee\/802.15. 4. In 2012 IEEE wireless communications and networking conference workshops (WCNCW). IEEE, 232\u2013237."},{"key":"e_1_3_2_1_44_1","unstructured":"[\n  44\n  ]  STM32WL55. [n. d.]. https:\/\/www.st.com\/en\/microcontrollers-microprocessors\/stm32wl55jc.html. Accessed: 2022-07.  [44] STM32WL55. [n. d.]. https:\/\/www.st.com\/en\/microcontrollers-microprocessors\/stm32wl55jc.html. Accessed: 2022-07."},{"key":"e_1_3_2_1_45_1","unstructured":"[\n  45\n  ]  Semtech SX1262. [n. d.]. https:\/\/www.semtech.com\/products\/wireless-rf\/lora-core\/sx1262mb2cas\/. Accessed: 2022-07.  [45] Semtech SX1262. [n. d.]. https:\/\/www.semtech.com\/products\/wireless-rf\/lora-core\/sx1262mb2cas\/. Accessed: 2022-07."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130970"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC48557.2020.9154273"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483250"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388913"},{"key":"e_1_3_2_1_50_1","unstructured":"[\n  50\n  ]  Arduino Uno. [n. d.]. https:\/\/docs.arduino.cc\/hardware\/uno-rev3\/. Accessed: 2022-07.  [50] Arduino Uno. [n. d.]. https:\/\/docs.arduino.cc\/hardware\/uno-rev3\/. Accessed: 2022-07."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3136996"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230565"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430731"},{"volume-title":"Low Noise, L3 Cache { Side-Channel} Attack. In 23rd USENIX security symposium (USENIX security 14). 719\u2013732.","author":"Yarom Yuval","key":"e_1_3_2_1_54_1","unstructured":"Yuval Yarom and Katrina Falkner . 2014. { FLUSH+ RELOAD} : A High Resolution , Low Noise, L3 Cache { Side-Channel} Attack. In 23rd USENIX security symposium (USENIX security 14). 719\u2013732. Yuval Yarom and Katrina Falkner. 2014. { FLUSH+ RELOAD} : A High Resolution, Low Noise, L3 Cache { Side-Channel} Attack. In 23rd USENIX security symposium (USENIX security 14). 719\u2013732."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300268"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00060"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00049"}],"event":{"name":"IPSN '23: The 22nd International Conference on Information Processing in Sensor Networks","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems"],"location":"San Antonio TX USA","acronym":"IPSN '23"},"container-title":["The 22nd International Conference on Information Processing in Sensor Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583120.3586959","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583120.3586959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:48Z","timestamp":1750182528000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583120.3586959"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,9]]},"references-count":57,"alternative-id":["10.1145\/3583120.3586959","10.1145\/3583120"],"URL":"https:\/\/doi.org\/10.1145\/3583120.3586959","relation":{},"subject":[],"published":{"date-parts":[[2023,5,9]]},"assertion":[{"value":"2023-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}