INFORMATION LEAKAGE FROM COMPUTER BASED ON ELECTROMAGNETIC RADIATION

Mao Jian and Liu Jinming

References

  1. [1] W van Eck, Electromagnetic radiation from video display units, An Eavesdropping Risk? Computers & Security, 4, 1985, 269–286.
  2. [2] J. Mao, Y.M. Li, and J.M. Zhang, Model for electromagnetic information leakage, TELKOMNIKA: Indonesian Journal of Electrical Engineering, 12(2), February 2014, 894–898.
  3. [3] J.M. Liu, J. Mao, and J.M. Zhang, The designing of TEMPEST security testing model, TELKOMNIKA: Indonesian Journal of Electrical Engineering, 2014, (2), 866–871.
  4. [4] J. Mao, Y.M. Li, and M. Liu, Research for data erasure based on EEPROM, The 5th International Conference on Computer Science & Education, 2010, 1377–1379.
  5. [5] J.M. Liu, J. Mao, and Y.M. Li, Designing eraser of secret information in EEPROM. The 5th International Conference on Computer Science & Education, 2010, 535–537.
  6. [6] M.G. Kuhn, Security limits for compromising emanations, Cryptographic Hardware and Embedded Systems, LNCS 3659, Springer, 2005, 265–279.
  7. [7] M.G. Kuhn, Compromising emanations of LCD TV sets, Electromagnetic Compatibility, IEEE Transactions on, 2013, 55(3), 564–570.
  8. [8] V. Bindar, M. Popescu, and R. Craciunescu, Aspects of electromagnetic compatibility as a support for communication security based on TEMPEST evaluation, Communications (COMM), 2014 10th International Conference on IEEE, 2014, 1–4.
  9. [9] V. Sundaresan, S. Rammohan, and R. Vemuri, Defense against side-channel power analysis attacks on microelectronic systems, Aerospace and Electronics Conference, 2008. NAECON 2008. IEEE National, 2008, 144–150.
  10. [10] J.M. Zhang and Y.M. Li, The study of the standards architecture and the standards attributes based on EMC standards and TEMPEST standards in computer system. The 8th International Conference on Computer Science & Education, Colombo, Sri Lanka, 2013.
  11. [11] H. Tanaka, Information leakage via electromagnetic emanations and evaluation of tempest countermeasures. Third International Conference on Information Systems Security, LNCS 4812, Springer, 2007, 167–179.
  12. [12] C.Y. Lai, C. Xiang, and T.H. Lee, Input-output transition models for discrete-time switched linear and nonlinear systems, Control and Intelligent Systems, 39(1), 2011, 47–59.
  13. [13] T. Ikematsu, Y.I. Hayashi, T. Mizuki, N. Homma, T. Aoki, and H. Sone, Suppression of information leakage from electronic devices based on SNR, Electromagnetic Compatibility (EMC), IEEE International Symposium, 2011.
  14. [14] M. Kinugawa, Y.I. Hayashi, T. Mizuki, and H. Sone, Information leakage from the unintentional emissions of an integrated RC oscillator, Electromagnetic Compatibility of Integrated Circuits (EMC Compo), 8th Workshop, 2011.
  15. [15] J. Espina, J. Balcells, and A. Arias, EMI model of an AC/AC power converter, Vehicle Power and Propulsion Conference (VPPC), IEEE, 2010, 1–6.
  16. [16] Y. Hayashi, T. Sugawara, and Y. Kayano, Information leakage from cryptographic hardware via common-mode current, Electromagnetic Compatibility, IEEE International Symposium, 2010, 109–114.

Important Links:

Go Back