Screaming channels: When electromagnetic side channels meet radio transceivers

G Camurati, S Poeplau, M Muench, T Hayes… - Proceedings of the …, 2018 - dl.acm.org
This paper presents a new side channel that affects mixed-signal chips used in widespread
wireless communication protocols, such as Bluetooth and WiFi. This increasingly common …

Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview

AJ Acosta, T Addabbo… - International Journal of …, 2017 - Wiley Online Library
We provide an overview of selected crypto‐hardware devices, with a special reference to the
lightweight electronic implementation of encryption/decryption schemes, hash functions, and …

Experimental demonstration of electromagnetic information leakage from modern processor-memory systems

A Zajić, M Prvulovic - IEEE Transactions on Electromagnetic …, 2014 - ieeexplore.ieee.org
This paper shows that electromagnetic (EM) information leakage from modern laptops and
desktops (with no peripherals attached) is indeed possible and is relatively easy to achieve …

A threat for tablet pcs in public space: Remote visualization of screen images using em emanation

Y Hayashi, N Homma, M Miura, T Aoki… - Proceedings of the 2014 …, 2014 - dl.acm.org
The use of tablet PCs is spreading rapidly, and accordingly users browsing and inputting
personal information in public spaces can often be seen by third parties. Unlike conventional …

Spectral profiling: Observer-effect-free profiling by monitoring EM emanations

N Sehatbakhsh, A Nazari, A Zajic… - 2016 49th Annual …, 2016 - ieeexplore.ieee.org
This paper presents Spectral Profiling, a new method for profiling program execution without
instrumenting or otherwise affecting the profiled system. Spectral Profiling monitors EM …

[HTML][HTML] Flexible graphene/silver nanoparticles/aluminum film paper for high-performance electromagnetic interference shielding

X Li, Y Qu, X Wang, H Bian, W Wu, H Dai - Materials & Design, 2022 - Elsevier
Rubber and plastic are widely acted as substrates in flexible electromagnetic shielding
(EMS) materials. However, these materials have several drawbacks in practical applications …

Screen gleaning: A screen reading TEMPEST attack on mobile devices exploiting an electromagnetic side channel

Z Liu, N Samwel, L Weissbart, Z Zhao, D Lauret… - arxiv preprint arxiv …, 2020 - arxiv.org
We introduce screen gleaning, a TEMPEST attack in which the screen of a mobile device is
read without a visual line of sight, revealing sensitive information displayed on the phone …

A method for finding frequency-modulated and amplitude-modulated electromagnetic emanations in computer systems

M Prvulovic, A Zajić, RL Callan… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
This paper presents an algorithm for finding carriers of frequency-modulated (FM) and
amplitude-modulated (AM) electromagnetic (EM) emanations from computer systems …

Secure Machine Learning Hardware: Challenges and Progress [Feature]

K Lee, M Ashok, S Maji, R Agrawal… - IEEE Circuits and …, 2025 - ieeexplore.ieee.org
With the rising adoption of deep neural networks (DNNs) for commercial and high-stakes
applications that process sensitive user data and make critical decisions, security concerns …

Design and evaluation of countermeasures against fault injection attacks and power side-channel leakage exploration for AES block cipher

FE Potestad-Ordonez, E Tena-Sánchez… - IEEE …, 2022 - ieeexplore.ieee.org
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main
methods for exploiting the vulnerabilities of physical implementations of block ciphers …