Crosstalk-Sensitive Loops and Reconstruction Algorithms to Eavesdrop Digital Signals Transmitted Along Differential Interconnects
暂无分享,去创建一个
Flavia Grassi | Sergio A. Pignari | Keliang Yuan | Giordano Spadacini | S. Pignari | G. Spadacini | F. Grassi | K. Yuan | Keliang Yuan
[1] Yu-ichi Hayashi,et al. Analysis of EM emission from cryptographic devices , 2014, 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS).
[2] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[3] C. Taylor,et al. The response of a terminated two-wire transmission line excited by a nonuniform electromagnetic field , 1965 .
[4] Flavia Grassi,et al. The Concept of Weak Imbalance and Its Role in the Emissions and Immunity of Differential Lines , 2013, IEEE Transactions on Electromagnetic Compatibility.
[5] Milos Prvulovic,et al. Experimental Demonstration of Electromagnetic Information Leakage From Modern Processor-Memory Systems , 2014, IEEE Transactions on Electromagnetic Compatibility.
[6] V. Tripathi. Asymmetric Coupled Transmission Lines in an Inhomogeneous Medium , 1975 .
[7] Y. Kami,et al. Generation and Propagation of Common-Mode Currents in a Balanced Two-Conductor Line , 2012, IEEE Transactions on Electromagnetic Compatibility.
[8] Yasunao Suzuki,et al. Jamming technique to prevent information leakage caused by unintentional emissions of PC video signals , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.
[9] Yuehong Yang,et al. On Mode Conversion in Geometrically Unbalanced Differential Lines and Its Analogy With Crosstalk , 2015, IEEE Transactions on Electromagnetic Compatibility.
[10] Hessamaldin Abdollahi,et al. Radiated Immunity Test Involving Crosstalk and Enforcing Equivalence With Field-to-Wire Coupling , 2016, IEEE Transactions on Electromagnetic Compatibility.
[11] Clayton R. Paul. Solution of the transmission-line equations under the weak-coupling assumption , 2002 .
[12] Martin Vuagnoux,et al. An improved technique to discover compromising electromagnetic emanations , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.
[13] Markus G. Kuhn,et al. Compromising Emanations , 2002, Encyclopedia of Cryptography and Security.
[14] P. Besnier,et al. Advanced Modeling of Crosstalk Between an Unshielded Twisted Pair Cable and an Unshielded Wire Above a Ground Plane , 2013, IEEE Transactions on Electromagnetic Compatibility.
[15] Qiang Cui,et al. Estimation of eavesdropping distance from conducted emission on network cable of a PC , 2012, 2012 6th Asia-Pacific Conference on Environmental Electromagnetics (CEEM).
[16] J. L. Norman Violette,et al. An Introduction to Electromagnetic Compatibility , 1987 .
[17] W. V. Eck. Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? , 1996 .
[18] Yang Li,et al. Introduction to side-channel attacks and fault attacks , 2016, 2016 Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC).
[19] Daryl G. Beetner,et al. A Comparison of Algorithms for Detecting Synchronous Digital Devices Using Their Unintended Electromagnetic Emissions , 2014, IEEE Transactions on Electromagnetic Compatibility.