INFORMATION LEAKAGE FROM COMPUTER BASED ON ELECTROMAGNETIC RADIATION

Mao Jian and Liu Jinming

References

  1. [1] W van Eck, Electromagnetic radiation from video display units, An Eavesdropping Risk? Computers & Security, 4, 1985, 269–286.
  2. [2] J. Mao, Y.M. Li, and J.M. Zhang, Model for electromagnetic information leakage, TELKOMNIKA: Indonesian Journal of Electrical Engineering, 12(2), February 2014, 894–898.
  3. [3] J.M. Liu, J. Mao, and J.M. Zhang, The designing of TEMPEST security testing model, TELKOMNIKA: Indonesian Journal of Electrical Engineering, 2014, (2), 866–871.
  4. [4] J. Mao, Y.M. Li, and M. Liu, Research for data erasure based on EEPROM, The 5th International Conference on Computer Science & Education, 2010, 1377–1379.
  5. [5] J.M. Liu, J. Mao, and Y.M. Li, Designing eraser of secret information in EEPROM. The 5th International Conference on Computer Science & Education, 2010, 535–537.
  6. [6] M.G. Kuhn, Security limits for compromising emanations,Cryptographic Hardware and Embedded Systems, LNCS 3659,Springer, 2005, 265–279.
  7. [7] M.G. Kuhn, Compromising emanations of LCD TV sets,Electromagnetic Compatibility, IEEE Transactions on, 2013,55(3), 564–570.
  8. [8] V. Bindar, M. Popescu, and R. Craciunescu, Aspects of electromagnetic compatibility as a support for communication security based on TEMPEST evaluation, Communications (COMM), 2014 10th International Conference on IEEE, 2014, 1–4.
  9. [9] V. Sundaresan, S. Rammohan, and R. Vemuri, Defense against side-channel power analysis attacks on microelectronic systems, Aerospace and Electronics Conference, 2008. NAECON 2008. IEEE National, 2008, 144–150.
  10. [10] J.M. Zhang and Y.M. Li, The study of the standardsarchitecture and the standards attributes based on EMCstandards and TEMPEST standards in computer system.The 8th International Conference on Computer Science &Education, Colombo, Sri Lanka, 2013.
  11. [11] H. Tanaka, Information leakage via electromagnetic emanations and evaluation of tempest countermeasures. Third International Conference on Information Systems Security, LNCS 4812, Springer, 2007, 167–179.
  12. [12] C.Y. Lai, C. Xiang, and T.H. Lee, Input-output transition models for discrete-time switched linear and nonlinear systems, Control and Intelligent Systems, 39(1), 2011, 47–59.
  13. [13] T. Ikematsu, Y.I. Hayashi, T. Mizuki, N. Homma, T. Aoki, and H. Sone, Suppression of information leakage from electronic devices based on SNR, Electromagnetic Compatibility (EMC), IEEE International Symposium, 2011.
  14. [14] M. Kinugawa, Y.I. Hayashi, T. Mizuki, and H. Sone, Information leakage from the unintentional emissions of an integrated RC oscillator, Electromagnetic Compatibility of Integrated Circuits (EMC Compo), 8th Workshop, 2011.
  15. [15] J. Espina, J. Balcells, and A. Arias, EMI model of an AC/AC power converter, Vehicle Power and Propulsion Conference (VPPC), IEEE, 2010, 1–6.
  16. [16] Y. Hayashi, T. Sugawara, and Y. Kayano, Information leakage from cryptographic hardware via common-mode current, Electromagnetic Compatibility, IEEE International Symposium, 2010, 109–114.

Important Links:

Go Back