2014
DOI: 10.1109/temc.2014.2357060
|View full text |Cite
|
Sign up to set email alerts
|

Event Logs Generated by an Operating System Running on a COTS Computer During IEMI Exposure

Abstract: Many studies were devoted to the analysis and the detection of electromagnetic attacks against critical electronic systems at the system or the component levels. Some attempts have been made to correlate effects scenarios with events logged by the kernel of the operating system (OS) of commercial-off-the-shelf computer running Windows. Due to the closed principle of the last OS, we decided to perform such an analysis on a computer running a Linux distribution in which a complete access to logs is available. It… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Methods for detecting irradiated EM waves have also been reported. A method of detection by measuring the power supply voltage on the FPGA that fluctuates owing to the irradiated EM waves [27], a method of detection by measurement of the frequency and phase synchronization gap between the reference CLK and the FPGA's CLK [28], a method of detection by analysis of the abnormal operation log of the system caused by interference with transmission signals [29], and a method of detection by measurement using hardware consisting of SDRs and/or discrete components [30], [31]. These methods can detect the irradiated EM wave, which is the first stage of Echo TEM-PEST, and interrupt the transmission process of the information, making it more difficult for an attacker to obtain the Echo.…”
Section: A Methods That Make It Difficult To Obtain the Echomentioning
confidence: 99%
“…Methods for detecting irradiated EM waves have also been reported. A method of detection by measuring the power supply voltage on the FPGA that fluctuates owing to the irradiated EM waves [27], a method of detection by measurement of the frequency and phase synchronization gap between the reference CLK and the FPGA's CLK [28], a method of detection by analysis of the abnormal operation log of the system caused by interference with transmission signals [29], and a method of detection by measurement using hardware consisting of SDRs and/or discrete components [30], [31]. These methods can detect the irradiated EM wave, which is the first stage of Echo TEM-PEST, and interrupt the transmission process of the information, making it more difficult for an attacker to obtain the Echo.…”
Section: A Methods That Make It Difficult To Obtain the Echomentioning
confidence: 99%
“…With hardwired IEMI, attack will be stronger, but more access to the home is needed. IEMI can either produce a disruption which may require manual restart, corrupt data, or even permanently damage electronic equipment [12], [13], [14], and [15]. It can be easily perceived that any of these outcomes could pose a serious risk to the devices inside a smart home.…”
Section: History Of Imei and Its Potential Impact On Smart Homesmentioning
confidence: 99%
“…Electromagnetic compatibility (EMC) and electromagnetic interference (EMI) threats have been studied by EMC experts in order to enhance the survivability of electronic devices and communication networks exposed to intentional electromagnetic interferences (IEMI) [1]- [4]. In addition, information security scientists have shown a high interest in fault injection on crypto systems [5]- [6] for secret keys extractions using EM pulses.…”
Section: Introductionmentioning
confidence: 99%
“…Both communities have in common their need for characterizing the effects of EM perturbations at the system level. Recently, a fine-grain classification of the effects of IEMI has been proposed [4] in which it was shown that the emitted signal envelop was induced and could be recorded on a sound card without connecting a microphone. Complementary experiments [7] have confirmed the high susceptibility of sound cards, Manuscript [2].…”
Section: Introductionmentioning
confidence: 99%