{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T07:40:13Z","timestamp":1772264413355,"version":"3.50.1"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["2211301"],"award-info":[{"award-number":["2211301"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100011039","name":"IARPA","doi-asserted-by":"crossref","award":["PO-IARPA 2021-21062400004"],"award-info":[{"award-number":["PO-IARPA 2021-21062400004"]}],"id":[{"id":"10.13039\/100011039","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2023,6,12]]},"abstract":"<jats:p>The proliferation of low-end low-power internet-of-things (IoT) devices in \"smart\" environments necessitates secure identification and authentication of these devices via low-overhead fingerprinting methods. Previous work typically utilizes characteristics of the device's wireless modulation (WiFi, BLE, etc.) in the spectrum, or more recently, electromagnetic emanations from the device's DRAM to perform fingerprinting. The problem is that many devices, especially low-end IoT\/embedded systems, may not have transmitter modules, DRAM, or other complex components, therefore making fingerprinting infeasible or challenging. To address this concern, we utilize electromagnetic emanations derived from the processor's clock to fingerprint. We present Digitus, an emanations-based fingerprinting system that can authenticate IoT devices at range. The advantage of Digitus is that we can authenticate low-power IoT devices using features intrinsic to their normal operation without the need for additional transmitters and\/or other complex components such as DRAM. Our experiments demonstrate that we achieve \u2265 95% accuracy on average, applicability in a wide range of IoT scenarios (range \u2265 5m, non-line-of-sight, etc.), as well as support for IoT applications such as finding hidden devices. Digitus represents a low-overhead solution for the authentication of low-end IoT devices.<\/jats:p>","DOI":"10.1145\/3596247","type":"journal-article","created":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T18:58:16Z","timestamp":1686596296000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Fingerprinting IoT Devices Using Latent Physical Side-Channels"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4723-4808","authenticated-orcid":false,"given":"Justin","family":"Feng","sequence":"first","affiliation":[{"name":"UCLA, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3413-1792","authenticated-orcid":false,"given":"Tianyi","family":"Zhao","sequence":"additional","affiliation":[{"name":"UCLA, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5083-8352","authenticated-orcid":false,"given":"Shamik","family":"Sarkar","sequence":"additional","affiliation":[{"name":"UCLA, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0418-2438","authenticated-orcid":false,"given":"Dominic","family":"Konrad","sequence":"additional","affiliation":[{"name":"UCLA, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5253-2818","authenticated-orcid":false,"given":"Timothy","family":"Jacques","sequence":"additional","affiliation":[{"name":"UCLA, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5967-2683","authenticated-orcid":false,"given":"Danijela","family":"Cabric","sequence":"additional","affiliation":[{"name":"UCLA, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7181-2258","authenticated-orcid":false,"given":"Nader","family":"Sehatbakhsh","sequence":"additional","affiliation":[{"name":"UCLA, Los Angeles, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,12]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"STM 32. [n. d.]. https:\/\/www.st.com\/en\/microcontrollers-microprocessors\/stm32--32-bit-arm-cortex-mcus.html. Accessed: 2022--11."},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2018.8494883"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155259"},{"key":"e_1_2_2_4_1","unstructured":"Indoor TV Antenna. [n. d.]. https:\/\/www.amazon.com\/dp\/B01FUB4ZG8?psc=1&ref=ppx_yo2ov_dt_b_product_details. Accessed: 2022--11."},{"key":"e_1_2_2_5_1","unstructured":"Jerome Antoni. [n. d.]. https:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/48909-cyclic-spectral-analysis\/. Accessed: 2022--11."},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2017.7946820"},{"key":"e_1_2_2_7_1","unstructured":"USPR B205mini-i. [n. d.]. https:\/\/www.ettus.com\/all-products\/usrp-b205mini-i\/. Accessed: 2022--11."},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2561902"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750394"},{"key":"e_1_2_2_11_1","unstructured":"Giovanni Camurati Aur\u00e9lien Francillon and Fran\u00e7ois-Xavier Standaert. [n. d.]. Understanding screaming channels: From a detailed analysis to improved attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems ([n. d.])."},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241580"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3035087"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196509"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339810"},{"key":"e_1_2_2_16_1","volume-title":"2013 USENIX Workshop on Health Information Technologies (HealthTech 13)","author":"Clark Shane S","year":"2013","unstructured":"Shane S Clark, Benjamin Ransford, Amir Rahmati, Shane Guineau, Jacob Sorber, Wenyuan Xu, and Kevin Fu. 2013. {WattsUpDoc}: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices. In 2013 USENIX Workshop on Health Information Technologies (HealthTech 13)."},{"key":"e_1_2_2_17_1","unstructured":"Great Scott Gadgets. [n.d.]. https:\/\/greatscottgadgets.com\/hackrf\/. Accessed: 2022--11."},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134081"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3126088"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3043332"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685569"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422308"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3064466"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.1900065"},{"key":"e_1_2_2_26_1","volume-title":"Cyclostationary approaches to signal detection and classification in cognitive radio. In 2007 2nd ieee international symposium on new frontiers in dynamic spectrum access networks","author":"Kim Kyouwoong","unstructured":"Kyouwoong Kim, Ihsan A Akbar, Kyung K Bae, Jung-Sun Um, Chad M Spooner, and Jeffrey H Reed. 2007. Cyclostationary approaches to signal detection and classification in cognitive radio. In 2007 2nd ieee international symposium on new frontiers in dynamic spectrum access networks. IEEE, 212--215."},{"key":"e_1_2_2_27_1","first-page":"1","article-title":"AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication","volume":"6","author":"Lee Kyuin","year":"2022","unstructured":"Kyuin Lee, Yucheng Yang, Omkar Prabhune, Aishwarya Lekshmi Chithra, Jack West, Kassem Fawaz, Neil Klingensmith, Suman Banerjee, and Younghyun Kim. 2022. AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 1 (2022), 1--29.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569476"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210332"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430414"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2019.2903232"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.284"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080223"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310073"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2838071"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00037"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3045305"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_26"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423650"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2020.3037659"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383884"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2945767"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00020"},{"key":"e_1_2_2_45_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Sharma Rahul Anand","year":"2022","unstructured":"Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, and Vyas Sekar. 2022. Lumos: Identifying and Localizing Diverse Hidden {IoT} Devices in an Unfamiliar Environment. In 31st USENIX Security Symposium (USENIX Security 22). 1095--1112."},{"key":"e_1_2_2_46_1","volume-title":"18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21)","author":"Shen Cheng","year":"2021","unstructured":"Cheng Shen and Jun Huang. 2021. {EarFisher}: Detecting Wireless Eavesdroppers by Stimulating and Sensing Memory {EMR}. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21). 873--886."},{"key":"e_1_2_2_47_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3550295","article-title":"Electromagnetic Fingerprinting of Memory Heartbeats: System and Applications","volume":"6","author":"Shen Cheng","year":"2022","unstructured":"Cheng Shen, Jun Huang, Guangyu Sun, and Jingshu Chen. 2022. Electromagnetic Fingerprinting of Memory Heartbeats: System and Applications. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 3 (2022), 1--23.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_2_2_48_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Singh Akash Deep","year":"2021","unstructured":"Akash Deep Singh, Luis Garcia, Joseph Noor, and Mani Srivastava. 2021. I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors. In 30th USENIX Security Symposium (USENIX Security 21). 1829--1846."},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"e_1_2_2_50_1","unstructured":"Semtech SX1262. [n. d.]. https:\/\/www.semtech.com\/products\/wireless-rf\/lora-core\/sx1262mb2cas\/. Accessed: 2022--07."},{"key":"e_1_2_2_51_1","unstructured":"Arduino Uno. [n. d.]. https:\/\/docs.arduino.cc\/hardware\/uno-rev3\/. Accessed: 2022--11."},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476338"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2016.7488014"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2911347"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300268"},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00049"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3596247","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3596247","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3596247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T04:44:53Z","timestamp":1752468293000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3596247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6,12]]}},"alternative-id":["10.1145\/3596247"],"URL":"https:\/\/doi.org\/10.1145\/3596247","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,12]]},"assertion":[{"value":"2023-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}