{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T04:18:47Z","timestamp":1729138727774,"version":"3.27.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607249","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"63-76","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["BitDance: Manipulating UART Serial Communication with IEMI"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0004-8827-4723","authenticated-orcid":false,"given":"Zhixin","family":"Xie","sequence":"first","affiliation":[{"name":"Zhejiang University, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4430-5263","authenticated-orcid":false,"given":"Chen","family":"Yan","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1101-0007","authenticated-orcid":false,"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4523-3735","authenticated-orcid":false,"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon. 2020. LX-15D High torque durable all metal gear Serial bus server. https:\/\/www.amazon.com\/LewanSoul-Real-Time-Feedback-Temperature-Indicator\/dp\/B07G11VJWR"},{"key":"e_1_3_2_1_2_1","unstructured":"ANCN. 2018. Pressure transmitter ACD-302. http:\/\/www.ancn.com\/a\/chanpinxilie\/xilieyi\/weishengxingyaliyibiao\/2016\/0321\/425.html"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2018.8393763"},{"volume-title":"2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 503\u2013520","year":"2022","author":"Dai Donghui","key":"e_1_3_2_1_4_1","unstructured":"Donghui Dai, Zhenlin An, and Lei Yang. 2022. Inducing wireless chargers to voice out for inaudible command attacks. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 503\u2013520."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00032"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517427"},{"volume-title":"Electromagnetic field theory fundamentals","author":"Guru Bhag\u00a0Singh","key":"e_1_3_2_1_7_1","unstructured":"Bhag\u00a0Singh Guru and H\u00fcseyin\u00a0R Hiziroglu. 2009. Electromagnetic field theory fundamentals. Cambridge university press."},{"key":"e_1_3_2_1_8_1","unstructured":"hiwonder. 2020. Hiwonder LX-15D Intelligent Serial Bus Servo with RGB Indicator for Displaying Robot Status. https:\/\/www.hiwonder.com\/products\/lx-15d"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833772"},{"volume-title":"WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1537\u20131537","year":"2022","author":"Jiang Yan","key":"e_1_3_2_1_10_1","unstructured":"Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, and Wenyuan Xu. 2022. WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1537\u20131537."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497771"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)","year":"2017","author":"Kurmus Anil","key":"e_1_3_2_1_13_1","unstructured":"Anil Kurmus, Nikolas Ioannou, Matthias Neugschwandtner, Nikolaos Papandreou, and Thomas Parnell. 2017. From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks. In 11th USENIX Workshop on Offensive Technologies (WOOT 17)."},{"volume-title":"\u201crowhammer","author":"Kurmus Anil","key":"e_1_3_2_1_14_1","unstructured":"Anil Kurmus, Nikolas Ioannou, Matthias Neugschwandtner, Nikolaos Papandreou, and Thomas Parnell. 2017. Is there a \u201crowhammer\u201d for MLC NAND Flash SSDs? An analysis of filesystem attack vectors."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00037"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2022.3175737"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMCEUROPE48519.2020.9245670"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00130"},{"volume-title":"One bit is (not) enough: An empirical study of the impact of single and multiple bit-flip errors. In 2017 47th annual IEEE\/IFIP international conference on dependable systems and networks (DSN)","author":"Sangchoolie Behrooz","key":"e_1_3_2_1_19_1","unstructured":"Behrooz Sangchoolie, Karthik Pattabiraman, and Johan Karlsson. 2017. One bit is (not) enough: An empirical study of the impact of single and multiple bit-flip errors. In 2017 47th annual IEEE\/IFIP international conference on dependable systems and networks (DSN). IEEE, 97\u2013108."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196556"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"volume-title":"24th USENIX Security Symposium (USENIX Security 15)","year":"2015","author":"Son Yunmok","key":"e_1_3_2_1_22_1","unstructured":"Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th USENIX Security Symposium (USENIX Security 15). 881\u2013896."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138836"},{"key":"e_1_3_2_1_24_1","unstructured":"Hardcore teardown. \"2023\". Disassemble an industrial device called a digital pressure sensor. https:\/\/www.youtube.com\/watch?v=E8wfSdKtP7s"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354195"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"volume-title":"31st USENIX Security Symposium (USENIX Security 22)","year":"2022","author":"Wang Kai","key":"e_1_3_2_1_28_1","unstructured":"Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, and Wenyuan Xu. 2022. GhostTouch: Targeted Attacks on Touchscreens without Physical Touch. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 1543\u20131559. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/wang-kai"},{"volume-title":"Sonic gun to smart devices: Your devices lose control under ultrasound\/sound. Black Hat USA","year":"2017","author":"Wang Zhengbo","key":"e_1_3_2_1_29_1","unstructured":"Zhengbo Wang, Kang Wang, Bo Yang, Shangyuan Li, and Aimin Pan. 2017. Sonic gun to smart devices: Your devices lose control under ultrasound\/sound. Black Hat USA (2017), 1\u201350."},{"volume-title":"Effects of intentional electromagnetic interference on analog to digital converter measurements of sensor outputs and general purpose input output pins. Ph.\u00a0D. Dissertation","author":"Ware A","key":"e_1_3_2_1_30_1","unstructured":"David\u00a0A Ware. 2017. Effects of intentional electromagnetic interference on analog to digital converter measurements of sensor outputs and general purpose input output pins. Ph.\u00a0D. Dissertation. Utah State University."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2021.3058585"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891951"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_34_1","unstructured":"Dejun\u00a0Liu Zhiyong\u00a0Guo. 2013. A Numerical Calculation Method for Spatial Magnetic Field of Circular Current. (2013)."}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:30:52Z","timestamp":1729074652000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607249"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":34,"alternative-id":["10.1145\/3607199.3607249","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607249","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}