Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure
暂无分享,去创建一个
Yu-ichi Hayashi | Masahiro Kinugawa | Daisuke Fujimoto | Y. Hayashi | Daisuke Fujimoto | M. Kinugawa
[1] Markus G. Kuhn,et al. Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations , 1998, Information Hiding.
[2] Markus G. Kuhn,et al. Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.
[3] Martin Vuagnoux,et al. An improved technique to discover compromising electromagnetic emanations , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.
[4] Ingrid Verbauwhede,et al. Detection of IEMI fault injection using voltage monitor constructed with fully digital circuit , 2018, 2018 IEEE International Symposium on Electromagnetic Compatibility and 2018 IEEE Asia-Pacific Symposium on Electromagnetic Compatibility (EMC/APEMC).
[5] Marc Joye,et al. Fault Analysis in Cryptography , 2012, Information Security and Cryptography.
[6] Zheng Gong,et al. Hardware Trojan Side-Channels Based on Physical Unclonable Functions , 2011, WISTP.
[7] Hidenori Sekiguchi,et al. Information leakage of input operation on touch screen monitors caused by electromagnetic noise , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.
[8] M. G. Kuhn,et al. Compromising emanations of LCD TV sets , 2011, 2011 IEEE International Symposium on Electromagnetic Compatibility.
[9] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[10] Ashutosh Sabharwal,et al. Passive Self-Interference Suppression for Full-Duplex Infrastructure Nodes , 2013, IEEE Transactions on Wireless Communications.
[11] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[12] Y. Hayashi,et al. Analysis of Electromagnetic Information Leakage From Cryptographic Devices With Different Physical Structures , 2013, IEEE Transactions on Electromagnetic Compatibility.
[13] Mark Mohammad Tehranipoor,et al. Power supply signal calibration techniques for improving detection resolution to hardware Trojans , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[14] Thomas P. Hayes,et al. Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers , 2018, CCS.
[15] Yu-ichi Hayashi,et al. A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation , 2014, CCS.
[16] Y. Yamanaka,et al. Feasibility study for reconstruction of information from near field observations of the magnetic field of laser printer , 2006, 2006 17th International Zurich Symposium on Electromagnetic Compatibility.
[17] Mark Mohammad Tehranipoor,et al. Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[18] Y. Yamanaka,et al. Method for Determining Whether or Not Information is Contained in Electromagnetic Disturbance Radiated From a PC Display , 2011, IEEE Transactions on Electromagnetic Compatibility.
[19] Jong-Gwan Yook,et al. Modeling of Leaked Digital Video Signal and Information Recovery Rate as a Function of SNR , 2015, IEEE Transactions on Electromagnetic Compatibility.
[20] C. Paul. Introduction to electromagnetic compatibility , 2005 .
[21] Y. Hayashi,et al. Efficient Evaluation of EM Radiation Associated With Information Leakage From Cryptographic Devices , 2013, IEEE Transactions on Electromagnetic Compatibility.
[22] Michel Mardiguian. Controlling Radiated Emissions by Design , 2012 .
[23] H. Sekiguchi,et al. Study on Maximum Receivable Distance for Radiated Emission of Information Technology Equipment Causing Information Leakage , 2013, IEEE Transactions on Electromagnetic Compatibility.
[24] Martin Vuagnoux,et al. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.
[25] W. V. Eck. Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? , 1996 .
[26] Yu-ichi Hayashi,et al. Remote Visualization of Screen Images Using a Pseudo-Antenna That Blends Into the Mobile Environment , 2017, IEEE Transactions on Electromagnetic Compatibility.
[27] John Clark,et al. Risks associated with USB Hardware Trojan devices used by insiders , 2011, 2011 IEEE International Systems Conference.
[28] Milos Prvulovic,et al. A Method for Finding Frequency-Modulated and Amplitude-Modulated Electromagnetic Emanations in Computer Systems , 2017, IEEE Transactions on Electromagnetic Compatibility.
[29] Lawrence T. Pileggi,et al. Building trusted ICs using split fabrication , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[30] Milos Prvulovic,et al. Experimental Demonstration of Electromagnetic Information Leakage From Modern Processor-Memory Systems , 2014, IEEE Transactions on Electromagnetic Compatibility.
[31] Mark Mohammad Tehranipoor,et al. Efficient and secure split manufacturing via obfuscated built-in self-authentication , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[32] Markus G. Kuhn,et al. Optical time-domain eavesdropping risks of CRT displays , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[33] H. Sekiguchi,et al. Proposal of an Information Signal Measurement Method in Display Image Contained in Electromagnetic Noise Emanated from a Personal Computer , 2008, 2008 IEEE Instrumentation and Measurement Technology Conference.
[34] G. Edward Suh,et al. FPGA-Based Remote Power Side-Channel Attacks , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[35] Markus G. Kuhn. Security Limits for Compromising Emanations , 2005, CHES.
[36] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[37] Yu-ichi Hayashi,et al. Range of information leakage from IoT devices with hardware Trojans , 2018 .