2016
DOI: 10.1002/2016rs006034
|View full text |Cite
|
Sign up to set email alerts
|

State‐of‐the‐art research on electromagnetic information security

Abstract: As information security is becoming increasingly significant, security at the hardware level is as important as in networks and applications. In recent years, instrumentation has become cheaper and more precise, computation has become faster, and capacities have increased. With these advancements, the threat of advanced attacks that were considerably difficult to carry out previously has increased not only in military and diplomatic fields but also in general‐purpose manufactured devices. This paper focuses on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…These techniques have been widely explored in the domain of information security for several decades. Among various potential use cases of EM-SCA, the most widely explored objective is the retrieval of cryptographic keys from computing devices while they are performing data encryption operations [13], [14]. Additionally, large scale monitoring of IoT devices; detecting deviations of program behaviour; and identification of malicious modifications to software and firmware are examples of other application of EM-SCA [9], [15].…”
Section: Related Workmentioning
confidence: 99%
“…These techniques have been widely explored in the domain of information security for several decades. Among various potential use cases of EM-SCA, the most widely explored objective is the retrieval of cryptographic keys from computing devices while they are performing data encryption operations [13], [14]. Additionally, large scale monitoring of IoT devices; detecting deviations of program behaviour; and identification of malicious modifications to software and firmware are examples of other application of EM-SCA [9], [15].…”
Section: Related Workmentioning
confidence: 99%
“…The general concept is that the employed square wave signaling of the clock signal contains many harmonics which are emitted in the far-field due to the rapid change in current. These harmonics contain high frequencies which will act as carrier waves on which transmitted and processed data is induced [4], [21]. The content of the leaked emanations is strongly determined by how the video information is processed and transmitted [22]- [24].…”
Section: Modulation Of Captured Video Leakages In the Far-fieldmentioning
confidence: 99%
“…The term electromagnetic compatibility (EMC) refers to a device's unintentional EM emissions that can affect the functionality of other devices and the health of humans who are exposed to it [27]. The Federal Communications Commission (FCC), the Food and Drug Administration (FDA), the International Electrotechnical Commission (IEC), and the European Union (EU) are examples of authorities concerned with EMC [88,89]. However, regarding the question of EM side-channel information leakage from general purpose electronic devices, there are no such rules to govern the manufacturers.…”
Section: Standards and Toolsmentioning
confidence: 99%