Create New Account
Login
Search or Buy Articles
Browse Journals
Browse Proceedings
Submit your Paper
Submission Information
Journal Review
Recommend to Your Library
Call for Papers
INFORMATION LEAKAGE FROM COMPUTER BASED ON ELECTROMAGNETIC RADIATION
Mao Jian and Liu Jinming
References
[1] W van Eck, Electromagnetic radiation from video display units, An Eavesdropping Risk? Computers & Security, 4, 1985, 269–286.
[2] J. Mao, Y.M. Li, and J.M. Zhang, Model for electromagnetic information leakage, TELKOMNIKA: Indonesian Journal of Electrical Engineering, 12(2), February 2014, 894–898.
[3] J.M. Liu, J. Mao, and J.M. Zhang, The designing of TEMPEST security testing model, TELKOMNIKA: Indonesian Journal of Electrical Engineering, 2014, (2), 866–871.
[4] J. Mao, Y.M. Li, and M. Liu, Research for data erasure based on EEPROM, The 5th International Conference on Computer Science & Education, 2010, 1377–1379.
[5] J.M. Liu, J. Mao, and Y.M. Li, Designing eraser of secret information in EEPROM. The 5th International Conference on Computer Science & Education, 2010, 535–537.
[6] M.G. Kuhn, Security limits for compromising emanations,Cryptographic Hardware and Embedded Systems, LNCS 3659,Springer, 2005, 265–279.
[7] M.G. Kuhn, Compromising emanations of LCD TV sets,Electromagnetic Compatibility, IEEE Transactions on, 2013,55(3), 564–570.
[8] V. Bindar, M. Popescu, and R. Craciunescu, Aspects of electromagnetic compatibility as a support for communication security based on TEMPEST evaluation, Communications (COMM), 2014 10th International Conference on IEEE, 2014, 1–4.
[9] V. Sundaresan, S. Rammohan, and R. Vemuri, Defense against side-channel power analysis attacks on microelectronic systems, Aerospace and Electronics Conference, 2008. NAECON 2008. IEEE National, 2008, 144–150.
[10] J.M. Zhang and Y.M. Li, The study of the standardsarchitecture and the standards attributes based on EMCstandards and TEMPEST standards in computer system.The 8th International Conference on Computer Science &Education, Colombo, Sri Lanka, 2013.
[11] H. Tanaka, Information leakage via electromagnetic emanations and evaluation of tempest countermeasures. Third International Conference on Information Systems Security, LNCS 4812, Springer, 2007, 167–179.
[12] C.Y. Lai, C. Xiang, and T.H. Lee, Input-output transition models for discrete-time switched linear and nonlinear systems, Control and Intelligent Systems, 39(1), 2011, 47–59.
[13] T. Ikematsu, Y.I. Hayashi, T. Mizuki, N. Homma, T. Aoki, and H. Sone, Suppression of information leakage from electronic devices based on SNR, Electromagnetic Compatibility (EMC), IEEE International Symposium, 2011.
[14] M. Kinugawa, Y.I. Hayashi, T. Mizuki, and H. Sone, Information leakage from the unintentional emissions of an integrated RC oscillator, Electromagnetic Compatibility of Integrated Circuits (EMC Compo), 8th Workshop, 2011.
[15] J. Espina, J. Balcells, and A. Arias, EMI model of an AC/AC power converter, Vehicle Power and Propulsion Conference (VPPC), IEEE, 2010, 1–6.
[16] Y. Hayashi, T. Sugawara, and Y. Kayano, Information leakage from cryptographic hardware via common-mode current, Electromagnetic Compatibility, IEEE International Symposium, 2010, 109–114.
Important Links:
Abstract
DOI:
10.2316/Journal.201.2015.2.201-2699
From Journal
(201) Mechatronic Systems and Control (formerly Control and Intelligent Systems) - 2015
Go Back