Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure

The problem of information leakage through electromagnetic waves for various devices has been extensively discussed in literature. Conventionally, devices that are under such a threat suffer from potential electromagnetic information leakage during their operation. Further, the information inside the devices can be obtained by monitoring the electromagnetic waves leaking at the boundaries of the devices. The leakage of electromagnetic waves, however, was not observed for some devices, and such devices were not the target of the threat discussed above. In light of this circumstance, this paper discusses an “interceptor” that forces the leakage of information through electromagnetic waves, even from devices in which potential electromagnetic leakage does not occur. The proposed interceptor is a small circuit consisting of an affordable semiconductor chip and wiring and is powered by electromagnetic waves that irradiate from the outside of a device as its driving energy. The distance at which information is obtained is controlled by increasing the intensity of the irradiated electromagnetic waves. The paper presents the structure of the circuit for implementing the proposed interceptor to be used in major input–output devices and cryptographic modules, mounting a pathway designed on the basis of the construction method onto each device. Moreover, it is shown that it is possible to forcefully cause information leakage through electromagnetic waves. To detect the aforementioned threat, the paper also focuses on the changes in a device itself and the surrounding electromagnetic environment as a result of mounting an interceptor and considers a method of detecting an interceptor by both passive and active monitoring methods.

[1]  Markus G. Kuhn,et al.  Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations , 1998, Information Hiding.

[2]  Markus G. Kuhn,et al.  Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.

[3]  Martin Vuagnoux,et al.  An improved technique to discover compromising electromagnetic emanations , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.

[4]  Ingrid Verbauwhede,et al.  Detection of IEMI fault injection using voltage monitor constructed with fully digital circuit , 2018, 2018 IEEE International Symposium on Electromagnetic Compatibility and 2018 IEEE Asia-Pacific Symposium on Electromagnetic Compatibility (EMC/APEMC).

[5]  Marc Joye,et al.  Fault Analysis in Cryptography , 2012, Information Security and Cryptography.

[6]  Zheng Gong,et al.  Hardware Trojan Side-Channels Based on Physical Unclonable Functions , 2011, WISTP.

[7]  Hidenori Sekiguchi,et al.  Information leakage of input operation on touch screen monitors caused by electromagnetic noise , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.

[8]  M. G. Kuhn,et al.  Compromising emanations of LCD TV sets , 2011, 2011 IEEE International Symposium on Electromagnetic Compatibility.

[9]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[10]  Ashutosh Sabharwal,et al.  Passive Self-Interference Suppression for Full-Duplex Infrastructure Nodes , 2013, IEEE Transactions on Wireless Communications.

[11]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[12]  Y. Hayashi,et al.  Analysis of Electromagnetic Information Leakage From Cryptographic Devices With Different Physical Structures , 2013, IEEE Transactions on Electromagnetic Compatibility.

[13]  Mark Mohammad Tehranipoor,et al.  Power supply signal calibration techniques for improving detection resolution to hardware Trojans , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.

[14]  Thomas P. Hayes,et al.  Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers , 2018, CCS.

[15]  Yu-ichi Hayashi,et al.  A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation , 2014, CCS.

[16]  Y. Yamanaka,et al.  Feasibility study for reconstruction of information from near field observations of the magnetic field of laser printer , 2006, 2006 17th International Zurich Symposium on Electromagnetic Compatibility.

[17]  Mark Mohammad Tehranipoor,et al.  Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[18]  Y. Yamanaka,et al.  Method for Determining Whether or Not Information is Contained in Electromagnetic Disturbance Radiated From a PC Display , 2011, IEEE Transactions on Electromagnetic Compatibility.

[19]  Jong-Gwan Yook,et al.  Modeling of Leaked Digital Video Signal and Information Recovery Rate as a Function of SNR , 2015, IEEE Transactions on Electromagnetic Compatibility.

[20]  C. Paul Introduction to electromagnetic compatibility , 2005 .

[21]  Y. Hayashi,et al.  Efficient Evaluation of EM Radiation Associated With Information Leakage From Cryptographic Devices , 2013, IEEE Transactions on Electromagnetic Compatibility.

[22]  Michel Mardiguian Controlling Radiated Emissions by Design , 2012 .

[23]  H. Sekiguchi,et al.  Study on Maximum Receivable Distance for Radiated Emission of Information Technology Equipment Causing Information Leakage , 2013, IEEE Transactions on Electromagnetic Compatibility.

[24]  Martin Vuagnoux,et al.  Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.

[25]  W. V. Eck Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? , 1996 .

[26]  Yu-ichi Hayashi,et al.  Remote Visualization of Screen Images Using a Pseudo-Antenna That Blends Into the Mobile Environment , 2017, IEEE Transactions on Electromagnetic Compatibility.

[27]  John Clark,et al.  Risks associated with USB Hardware Trojan devices used by insiders , 2011, 2011 IEEE International Systems Conference.

[28]  Milos Prvulovic,et al.  A Method for Finding Frequency-Modulated and Amplitude-Modulated Electromagnetic Emanations in Computer Systems , 2017, IEEE Transactions on Electromagnetic Compatibility.

[29]  Lawrence T. Pileggi,et al.  Building trusted ICs using split fabrication , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[30]  Milos Prvulovic,et al.  Experimental Demonstration of Electromagnetic Information Leakage From Modern Processor-Memory Systems , 2014, IEEE Transactions on Electromagnetic Compatibility.

[31]  Mark Mohammad Tehranipoor,et al.  Efficient and secure split manufacturing via obfuscated built-in self-authentication , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[32]  Markus G. Kuhn,et al.  Optical time-domain eavesdropping risks of CRT displays , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[33]  H. Sekiguchi,et al.  Proposal of an Information Signal Measurement Method in Display Image Contained in Electromagnetic Noise Emanated from a Personal Computer , 2008, 2008 IEEE Instrumentation and Measurement Technology Conference.

[34]  G. Edward Suh,et al.  FPGA-Based Remote Power Side-Channel Attacks , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[35]  Markus G. Kuhn Security Limits for Compromising Emanations , 2005, CHES.

[36]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[37]  Yu-ichi Hayashi,et al.  Range of information leakage from IoT devices with hardware Trojans , 2018 .