{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:26:48Z","timestamp":1773329208135,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545949","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"171-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Detection of Electromagnetic Signal Injection Attacks on Actuator Systems"],"prefix":"10.1145","author":[{"given":"Youqian","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Oxford, United Kingdom"}]},{"given":"Kasper","family":"Rasmussen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"HPM Detector System with Frequency Identification. In 2014 International Symposium on Electromagnetic Compatibility (EMC Europe). IEEE, 140\u2013145","author":"Adami Christian","year":"2014","unstructured":"Christian Adami , Christian Braun , Peter Clemens , M Joester , S Ruge , M Suhrke , HU Schmidt , and HJ Taenzer . 2014 . HPM Detector System with Frequency Identification. In 2014 International Symposium on Electromagnetic Compatibility (EMC Europe). IEEE, 140\u2013145 . Christian Adami, Christian Braun, Peter Clemens, M Joester, S Ruge, M Suhrke, HU Schmidt, and HJ Taenzer. 2014. HPM Detector System with Frequency Identification. In 2014 International Symposium on Electromagnetic Compatibility (EMC Europe). IEEE, 140\u2013145."},{"key":"e_1_3_2_1_2_1","volume-title":"EMC Europe 2011 York","author":"Adami Christian","unstructured":"Christian Adami , Christian Braun , Peter Clemens , Michael Suhrke , HU Schmidt , and Achim Taenzer . 2011. HPM Detection System for Mobile and Stationary Use . In EMC Europe 2011 York . IEEE , 1\u20136. Christian Adami, Christian Braun, Peter Clemens, Michael Suhrke, HU Schmidt, and Achim Taenzer. 2011. HPM Detection System for Mobile and Stationary Use. In EMC Europe 2011 York. IEEE, 1\u20136."},{"key":"e_1_3_2_1_3_1","volume-title":"Antenna Theory: Analysis and Design","author":"Balanis A","year":"2016","unstructured":"Constantine\u00a0 A Balanis . 2016 . Antenna Theory: Analysis and Design . John Wiley & Sons , 145\u2013176. Constantine\u00a0A Balanis. 2016. Antenna Theory: Analysis and Design. John Wiley & Sons, 145\u2013176."},{"key":"e_1_3_2_1_4_1","volume-title":"EMIs-inducted Failures in MOS Power Transistors. In 2009 International Conference on Electromagnetics in Advanced Applications. 564\u2013567","author":"Bona Calogero","year":"2009","unstructured":"Calogero Bona and Franco Fiori . 2009 . EMIs-inducted Failures in MOS Power Transistors. In 2009 International Conference on Electromagnetics in Advanced Applications. 564\u2013567 . https:\/\/doi.org\/10.1109\/ICEAA.2009.5297367 10.1109\/ICEAA.2009.5297367 Calogero Bona and Franco Fiori. 2009. EMIs-inducted Failures in MOS Power Transistors. In 2009 International Conference on Electromagnetics in Advanced Applications. 564\u2013567. https:\/\/doi.org\/10.1109\/ICEAA.2009.5297367"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2010.2086489"},{"key":"e_1_3_2_1_6_1","first-page":"2096","article-title":"Digital Suppression of EMI-Induced Errors in a Baseband Acquisition Front-End including Off-the-Shelf","volume":"10","author":"Crovetti Paolo","year":"2021","unstructured":"Paolo Crovetti and Francesco Musolino . 2021 . Digital Suppression of EMI-Induced Errors in a Baseband Acquisition Front-End including Off-the-Shelf , EMI-Sensitive Operational Amplifiers. Electronics 10 , 17 (2021), 2096 . Paolo Crovetti and Francesco Musolino. 2021. Digital Suppression of EMI-Induced Errors in a Baseband Acquisition Front-End including Off-the-Shelf, EMI-Sensitive Operational Amplifiers. Electronics 10, 17 (2021), 2096.","journal-title":"EMI-Sensitive Operational Amplifiers. Electronics"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMCEurope.2014.6931096"},{"key":"e_1_3_2_1_9_1","volume-title":"Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles. In IEEE Workshop on the Internet of Safe Things. IEEE.","author":"Dayanikli Y","year":"2020","unstructured":"Gokcen\u00a0 Y Dayanikli , Rees Hatch , Ryan\u00a0 M Gerdes , Hongjie Wang , and Regan Zane . 2020 . Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles. In IEEE Workshop on the Internet of Safe Things. IEEE. Gokcen\u00a0Y Dayanikli, Rees Hatch, Ryan\u00a0M Gerdes, Hongjie Wang, and Regan Zane. 2020. Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles. In IEEE Workshop on the Internet of Safe Things. IEEE."},{"key":"e_1_3_2_1_10_1","unstructured":"Analog Devices. 2009. RFI Rectification Concepts. https:\/\/www.analog.com\/media\/en\/training-seminars\/tutorials\/MT-096.pdf.  Analog Devices. 2009. RFI Rectification Concepts. https:\/\/www.analog.com\/media\/en\/training-seminars\/tutorials\/MT-096.pdf."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.08.020"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2013.2273123"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.1979.303772"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1946.234568"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2952858"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_25"},{"key":"e_1_3_2_1_18_1","unstructured":"Jasper\u00a0P Goedbloed. 1992. Electromagnetic Compatibility. Prentice-Hall.  Jasper\u00a0P Goedbloed. 1992. Electromagnetic Compatibility. Prentice-Hall."},{"key":"e_1_3_2_1_19_1","unstructured":"Ryan Hurley. 2007. Design Considerations for ESD\/EMI Filters: II Low Pass Filters for Audio Filter Applications. ON Semiconductor.  Ryan Hurley. 2007. Design Considerations for ESD\/EMI Filters: II Low Pass Filters for Audio Filter Applications. ON Semiconductor."},{"key":"e_1_3_2_1_20_1","unstructured":"Texas Instruments. 2013. AN-1698 A Specification for EMI Hardened Operational Amplifiers. https:\/\/www.ti.com\/lit\/an\/snoa497b\/snoa497b.pdf.  Texas Instruments. 2013. AN-1698 A Specification for EMI Hardened Operational Amplifiers. https:\/\/www.ti.com\/lit\/an\/snoa497b\/snoa497b.pdf."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/URSI-AT-RASC.2015.7303039"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2015.2463089"},{"key":"e_1_3_2_1_23_1","volume-title":"A Designer\u2019s Guide to Instrumentation Amplifiers","author":"Kitchin Charles","unstructured":"Charles Kitchin and Lew Counts . 2006. A Designer\u2019s Guide to Instrumentation Amplifiers . Analog Devices Norwood, MA. Charles Kitchin and Lew Counts. 2006. A Designer\u2019s Guide to Instrumentation Amplifiers. Analog Devices Norwood, MA."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497771"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.1979.303768"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/15.809842"},{"key":"e_1_3_2_1_28_1","unstructured":"Ron Mancini. 2003. Op Amps for Everyone: Design Reference. Newnes 189\u2013191.  Ron Mancini. 2003. Op Amps for Everyone: Design Reference. Newnes 189\u2013191."},{"key":"e_1_3_2_1_29_1","volume-title":"The Frequency Injection Attack on Ring-oscillator-based True Random Number Generators. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 317\u2013331","author":"Markettos A\u00a0Theodore","year":"2009","unstructured":"A\u00a0Theodore Markettos and Simon\u00a0 W Moore . 2009 . The Frequency Injection Attack on Ring-oscillator-based True Random Number Generators. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 317\u2013331 . A\u00a0Theodore Markettos and Simon\u00a0W Moore. 2009. The Frequency Injection Attack on Ring-oscillator-based True Random Number Generators. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 317\u2013331."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2018.10.022"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2018.2844027"},{"key":"e_1_3_2_1_32_1","unstructured":"John\u00a0G Proakis. 2001. Digital signal processing: principles algorithms and applications. Pearson Education India 500\u2013519.  John\u00a0G Proakis. 2001. Digital signal processing: principles algorithms and applications. Pearson Education India 500\u2013519."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653712"},{"key":"e_1_3_2_1_34_1","volume-title":"Design of analog CMOS integrated circuits","author":"Razavi Behzad","unstructured":"Behzad Razavi . 2005. Design of analog CMOS integrated circuits . McGraw-Hill Education . 100 \u2013 126 pages. Behzad Razavi. 2005. Design of analog CMOS integrated circuits. McGraw-Hill Education. 100 \u2013 126 pages."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.1979.303771"},{"key":"e_1_3_2_1_36_1","volume-title":"Watermarking Based Sensor Attack Detection in Home Automation Systems. In 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, 1\u20138.","author":"Ruotsalainen Henri","year":"2021","unstructured":"Henri Ruotsalainen , Albert Treytl , and Thilo Sauter . 2021 . Watermarking Based Sensor Attack Detection in Home Automation Systems. In 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, 1\u20138. Henri Ruotsalainen, Albert Treytl, and Thilo Sauter. 2021. Watermarking Based Sensor Attack Detection in Home Automation Systems. In 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, 1\u20138."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196556"},{"key":"e_1_3_2_1_39_1","volume-title":"Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society","author":"Shan Haoqi","year":"2022","unstructured":"Haoqi Shan , Boyi Zhang , Zihao Zhan , Dean Sullivan , Shuo Wang , and Yier Jin . 2022 . Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society , Los Alamitos, CA, USA, 1548\u20131548. https:\/\/doi.org\/10.1109\/SP46214. 2022.00119 10.1109\/SP46214.2022.00119 Haoqi Shan, Boyi Zhang, Zihao Zhan, Dean Sullivan, Shuo Wang, and Yier Jin. 2022. Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, Los Alamitos, CA, USA, 1548\u20131548. https:\/\/doi.org\/10.1109\/SP46214.2022.00119"},{"key":"e_1_3_2_1_40_1","volume-title":"Sampling Race: Bypassing Timing-based Analog Active Sensor Spoofing Detection on Analog-digital Systems. In 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16).","author":"Shin Hocheol","year":"2016","unstructured":"Hocheol Shin , Yunmok Son , Youngseok Park , Yujin Kwon , and Yongdae Kim . 2016 . Sampling Race: Bypassing Timing-based Analog Active Sensor Spoofing Detection on Analog-digital Systems. In 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16). Hocheol Shin, Yunmok Son, Youngseok Park, Yujin Kwon, and Yongdae Kim. 2016. Sampling Race: Bypassing Timing-based Analog Active Sensor Spoofing Detection on Analog-digital Systems. In 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)."},{"key":"e_1_3_2_1_41_1","volume-title":"Wireless Power Transfer via Radiowaves","author":"Shinohara Naoki","unstructured":"Naoki Shinohara . 2014. Wireless Power Transfer via Radiowaves . Wiley Online Library . Naoki Shinohara. 2014. Wireless Power Transfer via Radiowaves. Wiley Online Library."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813679"},{"key":"e_1_3_2_1_43_1","volume-title":"EMC Analysis Methods and Computational Models","author":"Tesche M","unstructured":"Frederick\u00a0 M Tesche , Michel Ianoz , and Torbj\u00f6rn Karlsson . 1996. EMC Analysis Methods and Computational Models . John Wiley & Sons . Frederick\u00a0M Tesche, Michel Ianoz, and Torbj\u00f6rn Karlsson. 1996. EMC Analysis Methods and Computational Models. John Wiley & Sons."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354195"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453097"},{"key":"e_1_3_2_1_46_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Wang Kai","year":"2022","unstructured":"Kai Wang , Richard Mitev , Chen Yan , Xiaoyu Ji , Ahmad-Reza Sadeghi , and Wenyuan Xu . 2022 . GhostTouch: Targeted Attacks on Touchscreens without Physical Touch . In 31st USENIX Security Symposium (USENIX Security 22) . USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/wang-kai Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, and Wenyuan Xu. 2022. GhostTouch: Targeted Attacks on Touchscreens without Physical Touch. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/wang-kai"},{"key":"e_1_3_2_1_47_1","volume-title":"GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. In Network and Distributed Systems Security (NDSS) Symposium.","author":"Wang Yuanda","year":"2022","unstructured":"Yuanda Wang , Hanqing Guo , and Qiben Yan . 2022 . GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. In Network and Distributed Systems Security (NDSS) Symposium. Yuanda Wang, Hanqing Guo, and Qiben Yan. 2022. GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. In Network and Distributed Systems Security (NDSS) Symposium."},{"key":"e_1_3_2_1_49_1","volume-title":"SI & PI)","author":"Wu Chunyu","unstructured":"Chunyu Wu , Guanghua Li , David\u00a0 J Pommerenke , Victor Khilkevich , and Gary Hess . 2018. Characterization of the RFI Rectification Behavior of Instrumentation Amplifiers. In 2018 IEEE Symposium on Electromagnetic Compatibility, Signal Integrity and Power Integrity (EMC , SI & PI) . IEEE , 156\u2013160. Chunyu Wu, Guanghua Li, David\u00a0J Pommerenke, Victor Khilkevich, and Gary Hess. 2018. Characterization of the RFI Rectification Behavior of Instrumentation Amplifiers. In 2018 IEEE Symposium on Electromagnetic Compatibility, Signal Integrity and Power Integrity (EMC, SI & PI). IEEE, 156\u2013160."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00026"},{"key":"e_1_3_2_1_51_1","volume-title":"Detection of Electromagnetic Interference Attacks on Sensor Systems. In IEEE Symposium on Security and Privacy. 203\u2013216","author":"Zhang Youqian","year":"2020","unstructured":"Youqian Zhang and Kasper Rasmussen . 2020 . Detection of Electromagnetic Interference Attacks on Sensor Systems. In IEEE Symposium on Security and Privacy. 203\u2013216 . Youqian Zhang and Kasper Rasmussen. 2020. Detection of Electromagnetic Interference Attacks on Sensor Systems. In IEEE Symposium on Security and Privacy. 203\u2013216."}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Limassol Cyprus","acronym":"RAID 2022"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545949","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:27Z","timestamp":1750188627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545949"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":47,"alternative-id":["10.1145\/3545948.3545949","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545949","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}