2022 IEEE Symposium on Security and Privacy (SP) 2022
DOI: 10.1109/sp46214.2022.9833767
|View full text |Cite
|
Sign up to set email alerts
|

Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 53 publications
0
4
0
Order By: Relevance
“…[24] proposed a countermeasure to a SDR side-channel attack on the Raspberry Pi by generating EM noise that consists of executing arithmetic instructions in an infinite loop. Noise-SDR [14] presents a novel technique by exploiting DRAM accesses to shape arbitrary signals out of EM noise from unprivileged software. Therefore, a rootkit may try to tamper by generating noise during execution.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…[24] proposed a countermeasure to a SDR side-channel attack on the Raspberry Pi by generating EM noise that consists of executing arithmetic instructions in an infinite loop. Noise-SDR [14] presents a novel technique by exploiting DRAM accesses to shape arbitrary signals out of EM noise from unprivileged software. Therefore, a rootkit may try to tamper by generating noise during execution.…”
Section: Discussionmentioning
confidence: 99%
“…SVM with Kernel PCA performs best by reaching a TPR of 100% on both devices. [14] 100 100 100 [16] 100 100 91.8 [16] 91.0 92.5 97.8 [11] 96.7 98.9 98.0 [15] 100 96.0 In this scenario, we go beyond detection (two-class binary classification) and classify the rootkits into multiple classes. Again, the settings between the training and testing phase remain constant.…”
Section: Rootkit Detectionmentioning
confidence: 99%
See 2 more Smart Citations