skip to main content
10.1145/3319535.3339810acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU

Published: 06 November 2019 Publication History

Abstract

With the widespread use of smart devices, device authentication has received much attention. One popular method for device authentication is to utilize internally-measured device fingerprints, such as device ID, software or hardware-based characteristics. In this paper, we propose DeMiCPU, a stimulation-response-based device fingerprinting technique that relies on externally-measured information, i.e., magnetic induction (MI) signals emitted from the CPU module that consists of the CPU chip and its affiliated power supply circuits. The key insight of DeMiCPU is that hardware discrepancies essentially exist among CPU modules and thus the corresponding MI signals make promising device fingerprints, which are difficult to be modified or mimicked. We design a stimulation and a discrepancy extraction scheme and evaluate them with 90 mobile devices, including 70 laptops (among which 30 are of totally identical CPU and operating system) and 20 smartphones. The results show that DeMiCPU can achieve 99.1% precision and recall on average, and 98.6% precision and recall for the 30 identical devices, with a fingerprinting time of 0.6 s. In addition, the performance can be further improved to 99.9% with multi-round fingerprinting.

Supplementary Material

WEBM File (p1149-cheng.webm)

References

[1]
Aksu, H., Uluagac, A. S., and Bentley, E. Identification of wearable devices with bluetooth. IEEE Transactions on Sustainable Computing (2018).
[2]
Baldini, G., Steri, G., Dimc, F., Giuliani, R., and Kamnik, R. Experimental identification of smartphones using fingerprints of built-in micro-electro mechanical systems (mems). Sensors 16, 6 (2016), 818.
[3]
Bellovin, S. M., and Merritt, M. Cryptographic protocol for secure communications, Aug. 31 1993. US Patent 5,241,599.
[4]
Bojinov, H., Michalevsky, Y., Nakibly, G., and Boneh, D. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416 (2014).
[5]
Brik, V., Banerjee, S., Gruteser, M., and Oh, S. Wireless device identification with radiometric signatures. In MobiCom (2008), ACM, pp. 116--127.
[6]
Brown, G. FEAST, January 2017. https://github.com/Craigacp/FEAST.
[7]
Bullock, J. LibXtract, July 2014. http://jamiebullock.github.io/ LibXtract/documentation/.
[8]
Callan, R., Behrang, F., Zajic, A., Prvulovic, M., and Orso, A. Zero-overhead profiling via em emanations. In ISSTA (2016), ACM, pp. 401--412.
[9]
Chen, K.-Y., Gupta, S., Larson, E. C., and Patel, S. Dose: Detecting user-driven operating states of electronic devices from a single sensing point. In PerCom (2015), IEEE, pp. 46--54.
[10]
Cleveland, T. L. Bi-directional power system for laptop computers. In APEC (2005), vol. 1, IEEE, pp. 199--203.
[11]
Das, A., Borisov, N., and Caesar, M. Do you hear what i hear?: Fingerprinting smart devices through embedded acoustic components. In CCS (2014), ACM, pp. 441--452.
[12]
Desmond, L. C. C., Yuan, C. C., Pheng, T. C., and Lee, R. S. Identifying unique devices through wireless fingerprinting. In WiSec (2008), ACM, pp. 46--55.
[13]
Dey, S., Roy, N., Xu,W., Choudhury, R. R., and Nelakuditi, S. Accelprint: Imperfections of accelerometers make smartphones trackable. In NDSS (2014).
[14]
Dirik, A. E., Sencar, H. T., and Memon, N. Digital single lens reflex camera identification from traces of sensor dust. IEEE Transactions on Information Forensics and Security 3, 3 (2008), 539--552.
[15]
Franklin, J., McCoy, D., Tabriz, P., Neagoe, V., Randwyk, J. V., and Sicker, D. Passive data link layer 802.11 wireless device driver fingerprinting. In USENIX Security (2006), vol. 3, pp. 16--89.
[16]
Gartner. Gartner Forecasts Flat Worldwide Device Shipments Until 2018, January 2017. http://www.gartner.com/newsroom/id/3560517.
[17]
Genkin, D., Pachmanov, L., Pipman, I., and Tromer, E. Stealing keys from pcs using a radio: Cheap electromagnetic attacks on windowed exponentiation. In CHES (2015), Springer, pp. 207--228.
[18]
Getz, R., and Moeckel, B. Understanding and eliminating emi in microcontroller applications. National Semiconductor (1996).
[19]
Geurts, P., Ernst, D., and Wehenkel, L. Extremely randomized trees. Machine learning 63, 1 (2006), 3--42.
[20]
Hall, J., Barbeau, M., and Kranakis, E. Radio frequency fingerprinting for intrusion detection in wireless networks. IEEE Transactions on Defendable and Secure Computing 12 (2005), 1--35.
[21]
Hupperich, T., Hosseini, H., and Holz, T. Leveraging sensor fingerprinting for mobile device authentication. In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 2016, pp. 377--396.
[22]
Instrument, T. Integrated Fluxgate Magnetic Sensor IC for Open-Loop Applications, March 2016. https://www.ti.com/product/DRV425.
[23]
Instruments, T. MSP430F5529 LaunchPad Development Kit, April 2017. http://www.ti.com/lit/ug/slau533d/slau533d.pdf.
[24]
Jain, A. K., Hong, L., Pankanti, S., and Bolle, R. An identityauthentication system using fingerprints. IEEE 85, 9 (1997), 1365--1388.
[25]
Keysight. U2541A 250kSa/s USB Modular Simultaneous Data Acquisition, June 2017. https://tinyurl.com/yb5r768y.
[26]
Kohno, T., Broido, A., and Claffy, K. C. Remote physical device fingerprinting. IEEE Transactions on Dependable and Secure Computing 2, 2 (2005), 93--108.
[27]
Langley, L. E. Specific emitter identification (sei) and classical parameter fusion technology. In WESCON (1993), IEEE, pp. 377--381.
[28]
Le Sueur, E., and Heiser, G. Dynamic voltage and frequency scaling: The laws of diminishing returns.
[29]
Lukas, J., Fridrich, J., and Goljan, M. Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 205--214.
[30]
Marr, D., Binns, F., Hill, D., Hinton, G., Koufaty, D., et al. Hyperthreading technology in the netburst® microarchitecture. Hot Chips (2002).
[31]
Mondri, R., and Bitan, S. Inspected secure communication protocol, Sept. 1 2009. US Patent 7,584,505.
[32]
Nguyen, K. T., Laurent, M., and Oualha, N. Survey on secure communication protocols for the internet of things. Ad Hoc Networks 32 (2015), 17--31.
[33]
Pang, J., Greenstein, B., Gummadi, R., Seshan, S., and Wetherall, D. 802.11 user fingerprinting. In MobiCom (2007), ACM, pp. 99--110.
[34]
Radhakrishnan, S. V., Uluagac, A. S., and Beyah, R. Gtid: A technique for physical device and device type fingerprinting. IEEE Transactions on Dependable and Secure Computing 12, 5 (2015), 519--532.
[35]
Ratha, N. K., Bolle, R. M., Pandit, V. D., and Vaish, V. Robust fingerprint authentication using local structural similarity. In WACV (2000), IEEE, pp. 29--34.
[36]
Remley, K., Grosvenor, C. A., Johnk, R. T., Novotny, D. R., Hale, P. D., McKinley, M., Karygiannis, A., and Antonakakis, E. Electromagnetic signatures of wlan cards and network security. In ISSPIT (2005), IEEE, pp. 484--488.
[37]
Solomon, D. A., Russinovich, M. E., and Ionescu, A. Windows internals. Microsoft Press, 2009.
[38]
Suleiman, D., Ibrahim, M., and Hamarash, I. Dynamic voltage frequency scaling (dvfs) for microprocessors power and energy reduction. In ICEEE (2005).
[39]
Travers, M. Cpu power consumption experiments and results analysis of intel i7--4820k.
[40]
Uluagac, A. S., Radhakrishnan, S. V., Corbett, C., Baca, A., and Beyah, R. A passive technique for fingerprinting wireless devices with wired-side observations. In CNS (2013), IEEE, pp. 305--313.
[41]
Ureten, O., and Serinken, N. Wireless security through rf fingerprinting. Canadian Journal of Electrical and Computer Engineering 32, 1 (2007), 27--33.
[42]
Van Goethem, T., Scheepers, W., Preuveneers, D., and Joosen, W. Accelerometer-based device fingerprinting for multi-factor mobile authentication. In ESSoS (2016), Springer, pp. 106--121.
[43]
Vaucelle, C., Ishii, H., and Paradiso, J. A. Cost-effective wearable sensor to detect emf. In CHI (2009), ACM, pp. 4309--4314.
[44]
Wang, E. J., Lee, T.-J., Mariakakis, A., Goel, M., Gupta, S., and Patel, S. N. Magnifisense: Inferring device interaction using wristworn passive magneto-inductive sensors. In UbiComp (2015), ACM, pp. 15--26.
[45]
Wikipedia. Ampère's circuital law, May 2018. https://en.wikipedia. org/wiki/Amp%C3%A8re%27s_circuital_law.
[46]
Yen, T.-F., Xie, Y., Yu, F., Yu, R. P., and Abadi, M. Host fingerprinting and tracking on the web: Privacy and security implications. In NDSS (2012).
[47]
Zhou, Z., Diao, W., Liu, X., and Zhang, K. Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound. In CCS (2014), ACM, pp. 429--440.
[48]
Zou, L., He, Q., and Wu, J. Source cell phone verification from speech recordings using sparse representation. Digital Signal Processing 62 (2017), 125--136.

Cited By

View all
  • (2024)PHIDIAS: Power Signature Host-based Intrusion Detection in Automotive MicrocontrollersProceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security10.1145/3689939.3695780(36-47)Online publication date: 19-Nov-2024
  • (2024)Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic EmanationsProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678917(660-673)Online publication date: 30-Sep-2024
  • (2024)GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic RadiationsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690362(3302-3316)Online publication date: 2-Dec-2024
  • Show More Cited By

Index Terms

  1. DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
    November 2019
    2755 pages
    ISBN:9781450367479
    DOI:10.1145/3319535
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 November 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cpu
    2. device fingerprinting
    3. electromagnetic radiation
    4. smart devices

    Qualifiers

    • Research-article

    Funding Sources

    • National Natural Science Foundation of China
    • Natural Science Foundation of Zhejiang Province
    • Fundamental Research Funds for the Central Universities

    Conference

    CCS '19
    Sponsor:

    Acceptance Rates

    CCS '19 Paper Acceptance Rate 149 of 934 submissions, 16%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)106
    • Downloads (Last 6 weeks)11
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)PHIDIAS: Power Signature Host-based Intrusion Detection in Automotive MicrocontrollersProceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security10.1145/3689939.3695780(36-47)Online publication date: 19-Nov-2024
    • (2024)Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic EmanationsProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678917(660-673)Online publication date: 30-Sep-2024
    • (2024)GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic RadiationsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690362(3302-3316)Online publication date: 2-Dec-2024
    • (2024)Anti-Spoofing Facial Authentication Based on COTS RFIDIEEE Transactions on Mobile Computing10.1109/TMC.2023.3289708(1-17)Online publication date: 2024
    • (2024)Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging CablesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.346502619(8892-8907)Online publication date: 2024
    • (2024)MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals LearningIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.325350721:1(372-387)Online publication date: Jan-2024
    • (2024)Using Near-Field Electromagnetic Side Channels for Efficiently Fingerprinting Wireless Modules2024 IEEE Physical Assurance and Inspection of Electronics (PAINE)10.1109/PAINE62042.2024.10792731(1-6)Online publication date: 12-Nov-2024
    • (2024)CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT DevicesIEEE Systems Journal10.1109/JSYST.2024.335122218:1(590-599)Online publication date: Mar-2024
    • (2024)M-PPG: A Nonintrusive Authentication for Wearable Devices via PPG Sensors With Motor ExcitationsIEEE Sensors Journal10.1109/JSEN.2024.344391424:19(31026-31039)Online publication date: 1-Oct-2024
    • (2024)Securing Passive Keyless Entry and Start System in Modern Vehicles Based on LF-Band Signal AnalysisIEEE Internet of Things Journal10.1109/JIOT.2024.345392011:24(40176-40190)Online publication date: 15-Dec-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media