Abstract This paper investigates the possibility of detecting the presence of hidden radio‐frequency eavesdroppers embedded in modern electronic devices. The detection of such cyber security threats is quite difficult as they intercept wireless signals passively and never transmit them. The proposed detection approach relies on the fact that the impedance of active radio‐frequency components in the eavesdropper circuit depends on their biased voltage, and that scattering characteristics of the eavesdropper can be affected by its internal impedance change. Using the device under test as a reflector, scattering characteristics and channel state information are measured. By comparing channel state information differences for the device under t...
Sensor systems are used every time a microcontroller needs to interact with the physical world. They...
In this paper, we study a novel approach to eavesdrop the messages of suspicious users for a surveil...
In cognitive radio networks, the unoccupied frequency bands licensed to primary users can be opport...
This thesis explores the possibility of detecting the hidden presence of wireless eavesdroppers. Suc...
The MIMO wiretap channel comprises a passive eavesdropper that attempts to intercept communications ...
The problem of information leakage through electromagnetic waves for various devices has been extens...
AbstractThe research within presents the use of Hidden Markov Models (HMM) for the detection of wire...
Given the wide use of Radio Frequency (RF) devices for applications ranging from data networks to wi...
The threat of chip-level tampering and its detection has been widely researched. Hardware Trojan ins...
Intelligent reflecting surfaces (IRSs) have several prominent advantages, including improving the le...
The research within presents the use of Hidden Markov Models (HMM) for the detection of wireless dev...
This paper deals with security threats concerning RFID and other wireless devices. We focus on eaves...
Secure wireless device identification is necessary if we want to ensure that any transmitted data re...
This paper describes a method for detecting electronic circuits based on their unintentional electro...
A method is proposed to implement a hardware Trojan that can be used to leak confidential informatio...
Sensor systems are used every time a microcontroller needs to interact with the physical world. They...
In this paper, we study a novel approach to eavesdrop the messages of suspicious users for a surveil...
In cognitive radio networks, the unoccupied frequency bands licensed to primary users can be opport...
This thesis explores the possibility of detecting the hidden presence of wireless eavesdroppers. Suc...
The MIMO wiretap channel comprises a passive eavesdropper that attempts to intercept communications ...
The problem of information leakage through electromagnetic waves for various devices has been extens...
AbstractThe research within presents the use of Hidden Markov Models (HMM) for the detection of wire...
Given the wide use of Radio Frequency (RF) devices for applications ranging from data networks to wi...
The threat of chip-level tampering and its detection has been widely researched. Hardware Trojan ins...
Intelligent reflecting surfaces (IRSs) have several prominent advantages, including improving the le...
The research within presents the use of Hidden Markov Models (HMM) for the detection of wireless dev...
This paper deals with security threats concerning RFID and other wireless devices. We focus on eaves...
Secure wireless device identification is necessary if we want to ensure that any transmitted data re...
This paper describes a method for detecting electronic circuits based on their unintentional electro...
A method is proposed to implement a hardware Trojan that can be used to leak confidential informatio...
Sensor systems are used every time a microcontroller needs to interact with the physical world. They...
In this paper, we study a novel approach to eavesdrop the messages of suspicious users for a surveil...
In cognitive radio networks, the unoccupied frequency bands licensed to primary users can be opport...