DemicPU: Device fingerprinting with magnetic signals radiated by CPU

53Citations
Citations of this article
64Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the widespread use of smart devices, device authentication has received much attention. One popular method for device authentication is to utilize internally-measured device fingerprints, such as device ID, software or hardware-based characteristics. In this paper, we propose DeMiCPU, a stimulation-response-based device fingerprinting technique that relies on externally-measured information, i.e., magnetic induction (MI) signals emitted from the CPU module that consists of the CPU chip and its affiliated power supply circuits. The key insight of DeMiCPU is that hardware discrepancies essentially exist among CPU modules and thus the corresponding MI signals make promising device fingerprints, which are difficult to be modified or mimicked. We design a stimulation and a discrepancy extraction scheme and evaluate them with 90 mobile devices, including 70 laptops (among which 30 are of totally identical CPU and operating system) and 20 smartphones. The results show that DeMiCPU can achieve 99.1% precision and recall on average, and 98.6% precision and recall for the 30 identical devices, with a fingerprinting time of 0.6 s. In addition, the performance can be further improved to 99.9% with multi-round fingerprinting.

Cite

CITATION STYLE

APA

Cheng, Y., Ji, X., Zhang, J., Xu, W., & Chen, Y. C. (2019). DemicPU: Device fingerprinting with magnetic signals radiated by CPU. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 1149–1162). Association for Computing Machinery. https://doi.org/10.1145/3319535.3339810

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free