2010 IEEE International Symposium on Electromagnetic Compatibility 2010
DOI: 10.1109/isemc.2010.5711257
|View full text |Cite
|
Sign up to set email alerts
|

An improved technique to discover compromising electromagnetic emanations

Abstract: Abstract-The techniques generally used to detect compromising emanations are based on a wide-band receiver tuned on a specific frequency or a spectral analyzer with a limited bandwidth. However, these methods may not be optimal since a significant amount of information is lost during the signal acquisition. In this paper, we propose a straightforward but efficient approach which acquires raw signal directly from the antenna and processes the entire captured electromagnetic spectrum thanks to the computation of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
29
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(35 citation statements)
references
References 4 publications
0
29
0
Order By: Relevance
“…At present, ICT devices at risk for EM information leakage include many commercial products, such as CRT and LCD monitors [2]- [12], printers [13], and keyboards [14] [15]. In particular, the threat of display capture via EM emanation, called EM display stealing, has been studied for the relatively larger displays of desktop and notebook PCs.…”
Section: Introductionmentioning
confidence: 99%
“…At present, ICT devices at risk for EM information leakage include many commercial products, such as CRT and LCD monitors [2]- [12], printers [13], and keyboards [14] [15]. In particular, the threat of display capture via EM emanation, called EM display stealing, has been studied for the relatively larger displays of desktop and notebook PCs.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, the following threats concerning leaks via electromagnetic radiation have been clearly identified: information on the screen of a desktop or notebook personal computer (PC) [Kuhn, 2011;Sekiguchi and Seto, 2011], information on the screen of a device such as a tablet or phone [Hayashi et al, 2014], information for business purposes calculated by the CPU of a PC [Zajic and Prvulovic, 2014], information output from a printer [Tosaka et al, 2006], keyboard input key information [Vuagnoux and Pasini, 2010], and secret key information in devices that process passwords [Agrawal et al, 2002].…”
Section: Introductionmentioning
confidence: 99%
“…However, the processed confidential information by the ITEs also may be embedded within the EM disturbance, even if the radiation and conduction emission levels are less than the limits. The malicious adversaries can reconstruct the processed date by receiving and analyzing these EM noises [2][3][4][5][6][7][8][9][10][11]. In recent years, the information leakage caused by EM radiation and conduction is a hot topic in the field of computer security.…”
Section: Introductionmentioning
confidence: 99%