The Pulse-Shaping Trojan: Refinements and New Results
Author(s)
Dhole, Sameer
Farahnak-Ghazani, Maryam
Makris, Yiorgos
Nosratinia, Aria
Issue Date
2025-09-17
Keyword(s)
Hardware Trojans
Wireless communication
Security
Abstract
Recently, an insidious wireless hardware vulnerability was revealed that surreptitiously exfiltrates information from a wireless node by manipulating a transmitter’s pulse-shaping filter. This paper introduces refinements and important new results for the pulse-shaping Trojan that further clarify its threat level and its clandestine nature. Error Vector Magnitude (EVM) is introduced as the metric for the distortion induced by this Trojan, replacing the inner product as a measure of the stealth of the rogue signaling. A Viterbi successive interference cancellation scheme is studied for the rogue receiver, to recover the rogue payload in the presence of the higher-power legitimate transmission. The differences and relative merits of the Viterbi receiver with respect to LMMSE interference cancellation is discussed in the context of Trojan signaling.
Publisher
Allerton Conference on Communication, Control, and Computing
Series/Report Name or Number
2025 61st Allerton Conference on Communication, Control, and Computing Proceedings
Use this login method if you
don't
have an
@illinois.edu
email address.
(Oops, I do have one)
IDEALS migrated to a new platform on June 23, 2022. If you created
your account prior to this date, you will have to reset your password
using the forgot-password link below.