{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:57:52Z","timestamp":1773511072153,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Technology Projects of Hunan Province","award":["2015TP1004"],"award-info":[{"award-number":["2015TP1004"]}]},{"name":"Hunan Provincial Key Research and Development Program","award":["2024AQ2041"],"award-info":[{"award-number":["2024AQ2041"]}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202150, Excellent Youth Fund, 62372166, 62102175, 62302162, U20A20174, U22A2030"],"award-info":[{"award-number":["62202150, Excellent Youth Fund, 62372166, 62102175, 62302162, U20A20174, U22A2030"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Projects","award":["2022YFB3103500"],"award-info":[{"award-number":["2022YFB3103500"]}]},{"name":"China Postdoctoral Science Foundation General Funding","award":["2023M741123"],"award-info":[{"award-number":["2023M741123"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690362","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"3302-3316","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic Radiations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2546-6306","authenticated-orcid":false,"given":"Yue","family":"Li","sequence":"first","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3647-0808","authenticated-orcid":false,"given":"Zhenxiong","family":"Yan","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7610-3677","authenticated-orcid":false,"given":"Wenqiang","family":"Jin","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7763-1079","authenticated-orcid":false,"given":"Zhenyu","family":"Ning","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8268-2951","authenticated-orcid":false,"given":"Daibo","family":"Liu","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-3887","authenticated-orcid":false,"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4538-8462","authenticated-orcid":false,"given":"Yu","family":"Liu","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6512-9145","authenticated-orcid":false,"given":"Huadi","family":"Zhu","sequence":"additional","affiliation":[{"name":"Boise State University, Idaho, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4303-2438","authenticated-orcid":false,"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Texas at Arlington, Arlington, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proccedings of the 2018 USENIX Security Symposium (USENIX Security).","author":"Alam Monjur","year":"2018","unstructured":"Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Callan, Alenka Zajic, and Milos Prvulovic. 2018. One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA. In Proccedings of the 2018 USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMCEurope.2019.8872035"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 2023 USENIX Security Symposium (USENIX Security).","author":"Ceccio Rose","year":"2023","unstructured":"Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, and Rahul Chatterjee. 2023. Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices. In Proceedings of the 2023 USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241580"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.23240"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196509"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339810"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417241"},{"key":"e_1_3_2_1_9_1","volume-title":"Spread-spectrum clocking in switching regulators for EMI reduction. IEICE transactions on fundamentals of electronics, communications and computer sciences","author":"Daimon Takayuki","year":"2003","unstructured":"Takayuki Daimon, Hiroshi Sadamura, Takayuki Shindou, Haruo Kobayashi, Masashi Kono, Takao Myono, Tatsuya Suzuki, Shuhei Kawai, and Takashi Iijima. 2003. Spread-spectrum clocking in switching regulators for EMI reduction. IEICE transactions on fundamentals of electronics, communications and computer sciences, Vol. 86, 2 (2003), 381--386."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1984.1164453"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660292"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467683"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCD.2006.272996"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107133"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484549"},{"key":"e_1_3_2_1_16_1","volume-title":"Theory of electromagnetic waves. New York","author":"Kong Jin Au","year":"1975","unstructured":"Jin Au Kong. 1975. Theory of electromagnetic waves. New York (1975)."},{"key":"e_1_3_2_1_17_1","unstructured":"LCSC ELECTRONICS. 2024. LCSC Suppliers. https:\/\/www.lcsc.com\/supplier\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177102.3177106"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538921"},{"key":"e_1_3_2_1_20_1","volume-title":"Spectrum classification using convolutional neural networks for a mini-camera detection system. Applied optics","author":"Liu Chun","year":"2019","unstructured":"Chun Liu, Changming Zhao, Haiyang Zhang, Zilong Zhang, Zitao Cai, and Zhipeng Li. 2019. Spectrum classification using convolutional neural networks for a mini-camera detection system. Applied optics, Vol. 58, 33 (2019), 9230--9239."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2019.2957521"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210332"},{"key":"e_1_3_2_1_23_1","first-page":"1","article-title":"Camradar: Hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations","volume":"6","author":"Liu Ziwei","year":"2023","unstructured":"Ziwei Liu, Feng Lin, Chao Wang, Yijie Shen, Zhongjie Ba, Li Lu, Wenyao Xu, and Kui Ren. 2023. Camradar: Hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Vol. 6, 4 (2023), 1--25.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)"},{"key":"e_1_3_2_1_24_1","volume-title":"Screen gleaning: A screen reading TEMPEST attack on mobile devices exploiting an electromagnetic side channel. arXiv preprint arXiv:2011.09877","author":"Liu Zhuoran","year":"2020","unstructured":"Zhuoran Liu, Niels Samwel, L\u00e9o Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, and Martha Larson. 2020. Screen gleaning: A screen reading TEMPEST attack on mobile devices exploiting an electromagnetic side channel. arXiv preprint arXiv:2011.09877 (2020)."},{"key":"e_1_3_2_1_25_1","volume-title":"Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel. arXiv preprint arXiv:2109.07395","author":"Maia Henrique Teles","year":"2021","unstructured":"Henrique Teles Maia, Chang Xiao, Dingzeyu Li, Eitan Grinspun, and Changxi Zheng. 2021. Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel. arXiv preprint arXiv:2109.07395 (2021)."},{"key":"e_1_3_2_1_26_1","unstructured":"MediaTek. 2024. MT2503 Design Notice. https:\/\/d86o2zu8ugzlg.cloudfront.net\/mediatek-craft\/documents\/mt3333\/MT3333_Datasheet.pdf."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906391"},{"key":"e_1_3_2_1_28_1","unstructured":"Department of Defense (DoD). 2024. Consumer privacy & identity quarterly. https:\/\/www.soc.mil\/IdM\/publications\/CPIQ\/quarterly2_3.pdf."},{"key":"e_1_3_2_1_29_1","unstructured":"HackRF One. 2024. HackRF one. https:\/\/greatscottgadgets.com\/hackrf\/one."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2010.2050955"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPICS58376.2023.10235399"},{"key":"e_1_3_2_1_32_1","first-page":"1","article-title":"Nyquist--Shannon sampling theorem","volume":"1","author":"Por Emiel","year":"2019","unstructured":"Emiel Por, Maaike van Kooten, and Vanja Sarkovic. 2019. Nyquist--Shannon sampling theorem. Leiden University, Vol. 1, 1 (2019), 1--2.","journal-title":"Leiden University"},{"key":"e_1_3_2_1_33_1","unstructured":"Quectel. 2019. Quectel MC20 Hardware Design V1.0. https:\/\/sisoog.com\/wp-content\/uploads\/2019\/12\/Quectel_MC20_Hardware_Design_V1.0.pdf."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560698"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the ACM International Conference on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)","volume":"6","author":"Salman Muhammad","year":"2022","unstructured":"Muhammad Salman, Nguyen Dao, Uichin Lee, and Youngtae Noh. 2022. CSI: DeSpy: Enabling Effortless Spy Camera Detection via Passive Sensing of User Activities and Bitrate Variations. Proceedings of the ACM International Conference on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Vol. 6, 2 (2022), 1--27."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485941"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358261"},{"key":"e_1_3_2_1_38_1","unstructured":"Sekorm. 2024. AT6558R Design Notice. https:\/\/en.sekorm.com\/doc\/1440132.html."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 2022 USENIX Security Symposium (USENIX Security).","author":"Sharma Rahul Anand","year":"2022","unstructured":"Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, and Vyas Sekar. 2022. Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment. In Proceedings of the 2022 USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 2021 USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Shen Cheng","year":"2021","unstructured":"Cheng Shen and Jun Huang. 2021. EarFisher: Detecting Wireless Eavesdroppers by Stimulating and Sensing Memory EMR. In Proceedings of the 2021 USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3550295"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00031"},{"key":"e_1_3_2_1_43_1","unstructured":"SHENZHEN YITUOWULIAN SYSTEM CO. LTD. 2024. GPS Tracker Locator. https:\/\/www.gpstrackerlocator.com\/."},{"key":"e_1_3_2_1_44_1","volume-title":"Proccedings of the 2021 USENIX Security Symposium (USENIX Security).","author":"Singh Akash Deep","year":"2021","unstructured":"Akash Deep Singh, Luis Garcia, Joseph Noor, and Mani Srivastava. 2021. I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors. In Proccedings of the 2021 USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2101330"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 2017 USENIX Security Symposium (USENIX Security).","author":"Su Yang","year":"2017","unstructured":"Yang Su, Daniel Genkin, Damith Ranasinghe, and Yuval Yarom. 2017. USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs. In Proceedings of the 2017 USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_47_1","unstructured":"U-Blox. 2024. Modern GNSS\/GPS signals. https:\/\/content.u-blox.com\/sites\/default\/files\/documents\/GPS-signals-migration-wp.pdf."},{"key":"e_1_3_2_1_48_1","unstructured":"U-BLOX. 2024. U-BLOX LEA-NEO-MAX-6. https:\/\/content.u-blox.com\/sites\/default\/files\/products\/documents\/LEA-NEO-MAX-6_HIM_(UBX-14054794)_1.pdf."},{"key":"e_1_3_2_1_49_1","unstructured":"U-BLOX. 2024. U-BLOX MIA-F10Q. https:\/\/content.u-blox.com\/sites\/default\/files\/documents\/MIA-F10Q_ProductSummary_UBX-23010023.pdf."},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the 2017 Chaos Communication Congress.","author":"Valeros Veronica","year":"2017","unstructured":"Veronica Valeros and Sebastian Garcia. 2017. Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection. In Proceedings of the 2017 Chaos Communication Congress."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411504.3421214"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 2021 ACM on Cyber-Physical System Security Workshop.","author":"Wang Ruize","year":"2021","unstructured":"Ruize Wang, Huanyu Wang, Elena Dubrova, and Martin Brisfors. 2021. Advanced far field EM side-channel attack on AES. In Proceedings of the 2021 ACM on Cyber-Physical System Security Workshop."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2019.8767411"},{"key":"e_1_3_2_1_54_1","unstructured":"www.gps.gov. 2020. GPS Protocol. https:\/\/www.gps.gov\/technical\/ps\/2020-SPS-performance-standard.pdf."},{"key":"e_1_3_2_1_55_1","unstructured":"www.gps.gov. 2024. New Civil Signals. https:\/\/www.gps.gov\/systems\/gps\/modernization\/civilsignals\/."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300274"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833773"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179480"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690362","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:06:13Z","timestamp":1755842773000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690362"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":58,"alternative-id":["10.1145\/3658644.3690362","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690362","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}