{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:26:11Z","timestamp":1763018771699,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"``Pioneer' and ``Leading Goose' R\\&D Program of Zhejiang","award":["No. 2024C03287"],"award-info":[{"award-number":["No. 2024C03287"]}]},{"name":"Postdoctoral Fellowship Program of CPSF","award":["No. GZC20241488"],"award-info":[{"award-number":["No. GZC20241488"]}]},{"name":"National Natural Science Foundation of China","award":["No. U21A20462 and 62372400"],"award-info":[{"award-number":["No. U21A20462 and 62372400"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678917","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"660-673","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic Emanations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1769-8540","authenticated-orcid":false,"given":"Wenfan","family":"Song","sequence":"first","affiliation":[{"name":"Zhejiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9003-8667","authenticated-orcid":false,"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China and Hangzhou City University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9667-360X","authenticated-orcid":false,"given":"Yajie","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5064-1955","authenticated-orcid":false,"given":"Jinsong","family":"Han","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"3dBi SubG\u00a0Antenna. 2023. 3dBi Antenna. https:\/\/store.rakwireless.com\/products\/3-dbi-lora-antenna."},{"key":"e_1_3_2_1_2_1","volume-title":"ABC: Enabling Smartphone Authentication with Built-in Camera. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Ba Zhongjie","year":"2018","unstructured":"Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, Aziz Mohaisen, and Kui Ren. 2018. ABC: Enabling Smartphone Authentication with Built-in Camera. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018. The Internet Society. https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2018\/02\/ndss2018_03B-3_Ba_paper.pdf"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_30"},{"key":"e_1_3_2_1_4_1","unstructured":"Encyclopaedia Britannica. 2023. Maxwell\u2019s equation. https:\/\/www.britannica.com\/science\/Maxwells-equations."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872887.2750394"},{"key":"e_1_3_2_1_6_1","unstructured":"CHRISTIAN CAWLEY. 2018. 5 Ways Data Can Be Stolen From Your PC or Network. https:\/\/www.makeuseof.com\/tag\/how-data-gets-stolen\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339810"},{"key":"e_1_3_2_1_8_1","unstructured":"COM-POWER. 2023. EMI And EMC Testing. https:\/\/www.com-power.com\/blog\/why-emi-emc-testing-necessary."},{"key":"e_1_3_2_1_9_1","unstructured":"Casey Crane. 2021. What Is a Device Certificate? Device Certificates Explained. https:\/\/www.thesslstore.com\/blog\/what-is-a-device-certificate-device-certificates-explained\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833595"},{"key":"e_1_3_2_1_11_1","volume-title":"On physical-layer identification of wireless devices. Comput. Surveys 45, 1","author":"Danev Boris","year":"2012","unstructured":"Boris Danev, Davide Zanetti, and Srdjan Capkun. 2012. On physical-layer identification of wireless devices. Comput. Surveys 45, 1 (2012), 6:1\u20136:29."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494984"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID51830.2021.00026"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Franklin Jason","year":"2006","unstructured":"Jason Franklin and Damon McCoy. 2006. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID).","author":"Guo Fanglu","year":"2005","unstructured":"Fanglu Guo and Tzi-cker Chiueh. 2005. Sequence Number-Based MAC Address Spoof Detection. In Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID)."},{"key":"e_1_3_2_1_16_1","volume-title":"Electromagnetic Emanations. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Han Yi","year":"2017","unstructured":"Yi Han, Sriharsha Etigowni, Hua Liu, Saman\u00a0A. Zonouz, and Athina\u00a0P. Petropulu. 2017. Watch Me, but Don\u2019t Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_17_1","unstructured":"Computer Hope. 2022. Serial number. https:\/\/www.computerhope.com\/jargon\/v\/vendorid.htm."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422308"},{"key":"e_1_3_2_1_19_1","unstructured":"Foresight Intelligent. 2023. Foresight low noise amplifier (FST-RFAMP02). https:\/\/m.tb.cn\/h.UrzGmIQ?tk=ipnmd9AHgeC."},{"key":"e_1_3_2_1_20_1","unstructured":"Rich Kolko. 2021. New out-of-the-box external hard drives could steal your data. https:\/\/winknews.com\/2021\/01\/11\/new-out-of-the-box-external-hard-drives-could-steal-your-data\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2018.2855448"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00070"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS49365.2020.9212855"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3173063"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23021"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1038\/222231a0"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID).","author":"Maier Dominik\u00a0Christian","year":"2020","unstructured":"Dominik\u00a0Christian Maier, Henrik Erb, Patrick Mullan, and Vincent Haupert. 2020. Camera Fingerprinting Authentication Revisited. In Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID)."},{"key":"e_1_3_2_1_28_1","volume-title":"Magdalene Wan\u00a0Ching Goh, and Veerendra Dakulagi","author":"Ng Len\u00a0Luet","year":"2022","unstructured":"Len\u00a0Luet Ng, Kim\u00a0Ho Yeap, Magdalene Wan\u00a0Ching Goh, and Veerendra Dakulagi. 2022. Power Consumption in CMOS Circuits. In Electromagnetic Field in Advancing Science and Technology. IntechOpen."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.01.006"},{"key":"e_1_3_2_1_30_1","unstructured":"Michael Ossmann. 2021. HackRF One. https:\/\/greatscottgadgets.com\/hackrf\/one\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Pierluigi Paganini. 2014. How cybercrime exploits digital certificates. https:\/\/resources.infosecinstitute.com\/topic\/cybercrime-exploits-digital-certificates\/."},{"volume-title":"Experimental Vibration Analysis for Civil Structures: Testing, Sensing, Monitoring, and Control 7","author":"Pan Hong","key":"e_1_3_2_1_32_1","unstructured":"Hong Pan, Mohsen Azimi, Guoqing Gui, Fei Yan, and Zhibin Lin. 2018. Vibration-based support vector machine for structural health monitoring. In Experimental Vibration Analysis for Civil Structures: Testing, Sensing, Monitoring, and Control 7. Springer, 167\u2013178."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287866"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1149\/2.0181605jss"},{"key":"e_1_3_2_1_35_1","unstructured":"RANDY. 2022. Can an External Hard Drive Get A Virus?https:\/\/whatsabyte.com\/can-external-hard-drive-get-virus\/."},{"key":"e_1_3_2_1_36_1","unstructured":"RebellionResearch. 2023. What are the advantages and disadvantages of random forest?https:\/\/www.rebellionresearch.com\/what-are-the-advantages-and-disadvantages-of-random-forest."},{"key":"e_1_3_2_1_37_1","unstructured":"Doug Rollins. 2012. An Overview of SSD Write Caching. https:\/\/static.spiceworks.com\/attachments\/post\/0013\/5918\/ssd_write_caching_tech_brief_lo.pdf."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783762"},{"key":"e_1_3_2_1_39_1","unstructured":"Sudip Sengupta. 2022. What is Password Attack. https:\/\/crashtest-security.com\/password-attack\/."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00031"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229048"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2019.2952852"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00041"},{"key":"e_1_3_2_1_44_1","unstructured":"TheHack.com.br. 2019. Hackers Attack Uber Vendor Leaking Some User Credentials. https:\/\/blog.axur.com\/en\/credential-leaks-how-they-work-and-why-you-should-be-concerned."},{"key":"e_1_3_2_1_45_1","unstructured":"Vijay. 2023. Top 11 Best External Hard Disk. https:\/\/www.softwaretestinghelp.com\/best-external-hard-disk\/."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241541"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2964290"},{"key":"e_1_3_2_1_48_1","unstructured":"Wikipedia. 2023. Median Absolute Deviation. https:\/\/en.wikipedia.org\/wiki\/Median_absolute_deviation."},{"key":"e_1_3_2_1_49_1","unstructured":"Wikipedia. 2023. Microprocessor chronology. https:\/\/en.wikipedia.org\/wiki\/Microprocessor_chronology."},{"key":"e_1_3_2_1_50_1","unstructured":"Wikipedia. 2023. Password. https:\/\/en.wikipedia.org\/wiki\/Password."},{"key":"e_1_3_2_1_51_1","unstructured":"Wikipedia. 2023. Serial number. https:\/\/en.wikipedia.org\/wiki\/Serial_number."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560515"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155534"},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the Annual Network and Distributed System Security Symposium (NDSS).","author":"Yen Ting-Fang","year":"2012","unstructured":"Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger\u00a0Peng Yu, and Mart\u00edn Abadi. 2012. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660300"}],"event":{"name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID '24","location":"Padua Italy"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678917","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678917"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":55,"alternative-id":["10.1145\/3678890.3678917","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678917","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}