Defense MEDIUM relevance

ClawGuard: Out-of-Band Detection of LLM Agent Workflow Hijacking via EM Side Channel

Leo Linqian Gan (Shanghai Jiao Tong University) Jeffery Wu (Shanghai Jiao Tong University) Longyuan Ge (Shanghai Jiao Tong University) Lanqing Yang (Shanghai Jiao Tong University) Yonghao Song (Shanghai Jiao Tong University) Jingkai Zhang (Shanghai Jiao Tong University) Haojia Jin (Shanghai Jiao Tong University) Weiyi Wang (Shanghai Jiao Tong University) Guangtao Xue (Shanghai Jiao Tong University)
Published
May 7, 2026
Updated
May 7, 2026

Abstract

Autonomous LLM agents face a critical security risk known as workflow hijacking, where attackers subtly alter tool and skill invocations. Existing defenses rely on host-internal telemetry (such as audit logs), which can be forged if the host OS is compromised. To solve this, we introduce ClawGuard, a passive, out-of-band monitor that audits LLM-agent workflows using electromagnetic (EM) emanations. Because distinct agent skills create unique hardware usage patterns (computation, DRAM, network blocking), they emit measurable, macroscopic EM envelopes. External software-defined radios (SDRs) capture these physical signals. Using a drift-aware pipeline with 320-dimensional features, ClawGuard converts RF streams into physical evidence. Evaluated on a 7.82TB RF corpus, ClawGuard achieved an AUC of 0.9945, detecting attacks with a 100% true-positive rate and a 1.16% false-positive rate. This proves passive EM sensing is a practical, forge-resistant physical check against compromised host software.

Pro Analysis

Full threat analysis, ATLAS technique mapping, compliance impact assessment (ISO 42001, EU AI Act), and actionable recommendations are available with a Pro subscription.

Threat Deep-Dive
ATLAS Mapping
Compliance Reports
Actionable Recommendations
Start 14-Day Free Trial