Jian Mao, Peiguo Liu, Jinming Liu and Zhenzhong Han


  1. [1] W. van Eck, Electromagnetic radiation from video displayunits: An eavesdropping risk? Computer Security, 4, 1985,269–286.
  2. [2] Y. Hayashi, N. Homma, T. Mizuki, and H. Shimada, Intro-duction to the special section on electromagnetic informationsecurity, IEEE Transaction on Electromagnetic Compatibility,55(3), 2013.41Conclusion
  3. [3] J. Mao, Y.M. Li, and J.M. Zhang, Model for electromagneticinformation leakage, TELKOMNIKA, 12(2), 2014, 894–898.
  4. [4] M.G. Kuhn, Security limits for compromising emanations,Cryptographic Hardware and Embedded Systems , in J.R. Raoand B. Sunar (eds.) (Edinburgh, United kingdom: SpringerVerlag, Springer, 2005), 265–279.
  5. [5] Y. Hayashi, N. Homma, and M. Miura, A threat for tablet pcsin public space: Remote visualization of screen images usingEM emanation, CCS’14, Scottsdale, USA, 2014, 954–965.
  6. [6] J.M. Liu, J. Mao, and J.M. Zhang, The designing of TEMPESTsecurity testing model, TELKOMNIKA, 12(2), 2014, 866–871.
  7. [7] M.G. Kuhn, Compromising emanations of LCD TV sets, IEEETransaction on Electromagnetic Compatibility, 55(3), 2013,564–570.
  8. [8] T. Tosaka, Y. Yamakana, K. Fukunaga, R. Ishikawa, andM. Hattori, Method of evaluating information leakage from PCdisplay, IEEE Int. Symp. EMC, Honolulu, Hawaii, 2007, 1–4.
  9. [9] T. Tosaka, Y. Yamakana, K. Fukunaga, R. Ishikawa, andM. Hattori, Evaluation of information leakage from pc displayusing spectrum analyzers, IEICE Transactions on Communi-cations, E90-B(11), 2007, 3315–3318.
  10. [10] H. Zhang, Y. Huang, and J. Wang, Recognition of electro-magnetic leakage information from computer radiation withSVM, Computers & Security, 28, 2009, 72–76.
  11. [11] H. Zhang, J. Zhang, and D. Wang, Quantitative evaluationof information leakage arising from computer, InternationalJournal of Applied Electromagnetics & Mechanics, 40(2), 2012,101–111.
  12. [12] H. Sekiguchi and S. Seto, Measurement system of informationsignal in display image leaking from conducted emission onpower leads of a personal computer, EMC’2009, Kyoto, Japan,2009, 51–64.
  13. [13] T. Tosaka, Y. Yamanaka, and K. Fukunaga, Method for deter-mining whether or not information is contained in electromag-netic disturbance radiated from PC display, IEEE Transactionson Electromagnetic Compatibility, 53(2), 2011, 318–324.
  14. [14] J. Mao and J.M. Liu, Information leakage from computer basedon electromagnetic radiation, Control and Intelligent Systems,43(2), 2015. DOI: 10.2316/Journal.201.2015.2.201-2699.
  15. [15] VESA and industry standards and guidelines for computerdisplay monitor timing (DMT) Version 1.0 (Revision 10October 29, 2004).

Important Links:

Go Back