Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis

[1]  Isin Erer,et al.  Realistic eavesdropping attacks on computer displays with low-cost and mobile receiver system , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[2]  Eric Peeters,et al.  Power and electromagnetic analysis: Improved model, consequences and comparisons , 2007, Integr..

[3]  Eric Blossom,et al.  GNU radio: tools for exploring the radio frequency spectrum , 2004 .

[4]  Nhien-An Le-Khac,et al.  Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection , 2020, Digit. Investig..

[5]  Dong Yu,et al.  Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..

[6]  Wojciech Samek,et al.  Methods for interpreting and understanding deep neural networks , 2017, Digit. Signal Process..

[7]  Baki Berkay Yilmaz,et al.  Cell-Phone Classification: A Convolutional Neural Network Approach Exploiting Electromagnetic Emanations , 2020, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[8]  Ibrahim M. Baggili,et al.  Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition , 2017, ARES.

[9]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[10]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[11]  Nhien-An Le-Khac,et al.  EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis , 2020, Digit. Investig..

[12]  Wim van Eck,et al.  Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..

[13]  Horst Bischof,et al.  Interactive Texture Segmentation using Random Forests and Total Variation , 2009, BMVC.

[14]  Baki Berkay Yilmaz,et al.  Detecting Cellphone Camera Status at Distance by Exploiting Electromagnetic Emanations , 2019, MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM).

[15]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[16]  Thomas P. Hayes,et al.  Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers , 2018, CCS.

[17]  Stephen Cass A $40 software-defined radio [Resources_Hands On] , 2013, IEEE Spectrum.

[18]  James Clerk Maxwell,et al.  VIII. A dynamical theory of the electromagnetic field , 1865, Philosophical Transactions of the Royal Society of London.

[19]  Milos Prvulovic,et al.  EDDIE: EM-based detection of deviations in program execution , 2017, 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA).

[20]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[21]  Nhien-An Le-Khac,et al.  SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation , 2020, ARES.

[22]  María de Lourdes Martínez-Villaseñor,et al.  A Flexible Approach for Human Activity Recognition Using Artificial Hydrocarbon Networks , 2016, Sensors.

[23]  Choong Seon Hong,et al.  Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges , 2019, Future Gener. Comput. Syst..

[24]  Jean-Michel Poggi,et al.  Variable selection using random forests , 2010, Pattern Recognit. Lett..

[25]  Saibal Mukhopadhyay,et al.  Application Inference using Machine Learning based Side Channel Analysis , 2019, 2019 International Joint Conference on Neural Networks (IJCNN).

[26]  Nhien-An Le-Khac,et al.  A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics , 2019, Digit. Investig..

[27]  Arthur L. Samuel,et al.  Some Studies in Machine Learning Using the Game of Checkers , 1967, IBM J. Res. Dev..

[28]  Nhien-An Le-Khac,et al.  Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework , 2020, Digit. Investig..

[29]  Ali Dehghantanha,et al.  Digital forensics: the missing piece of the Internet of Things promise , 2016 .

[30]  Nhien-An Le-Khac,et al.  Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis , 2018, ISSTA/ECOOP Workshops.

[31]  Hermann Seuschek,et al.  Side-Channel Attacks in the Internet of Things: Threats and Challenges , 2018 .

[32]  Adi Shamir,et al.  IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[33]  Nhien-An Le-Khac,et al.  Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices , 2019, Digit. Investig..