Remote Visualization of Screen Images Using a Pseudo-Antenna That Blends Into the Mobile Environment
暂无分享,去创建一个
Yu-ichi Hayashi | Takafumi Aoki | Naofumi Homma | Yohei Toriumi | Kazuhiro Takaya | T. Aoki | N. Homma | Yu-ichi Hayashi | Y. Toriumi | K. Takaya
[1] Markus G. Kuhn,et al. Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.
[2] Yu-ichi Hayashi,et al. A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation , 2014, CCS.
[3] Martin Vuagnoux,et al. An improved technique to discover compromising electromagnetic emanations , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.
[4] Y. Hayashi,et al. Analysis of Electromagnetic Information Leakage From Cryptographic Devices With Different Physical Structures , 2013, IEEE Transactions on Electromagnetic Compatibility.
[5] T.H. Hubing,et al. Model for estimating radiated emissions from a printed circuit board with attached cables due to Voltage-driven sources , 2005, IEEE Transactions on Electromagnetic Compatibility.
[6] H. Sekiguchi,et al. Estimation of receivable distance for radiated disturbance containing information signal from information technology equipment , 2011, 2011 IEEE International Symposium on Electromagnetic Compatibility.
[7] C. Paul. Introduction to Electromagnetic Compatibility (Wiley Series in Microwave and Optical Engineering) , 2006 .
[8] M. G. Kuhn,et al. Compromising emanations of LCD TV sets , 2011, 2011 IEEE International Symposium on Electromagnetic Compatibility.
[9] Markus G. Kuhn,et al. Optical time-domain eavesdropping risks of CRT displays , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[10] Michel Mardiguian. Controlling Radiated Emissions by Design , 2012 .
[11] Martin Vuagnoux,et al. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.
[12] T. Watanabe,et al. Towards large-scale EM-leakage evaluation by means of automated TOE synchronisation , 2011, 2011 IEEE International Symposium on Electromagnetic Compatibility.
[13] W. V. Eck. Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? , 1996 .
[14] Takeshi Sugawara,et al. Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules , 2009, WISA.
[15] Markus G. Kuhn,et al. Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations , 1998, Information Hiding.
[16] Hidenori Sekiguchi,et al. Information leakage of input operation on touch screen monitors caused by electromagnetic noise , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.
[17] Markus G. Kuhn. Security Limits for Compromising Emanations , 2005, CHES.
[18] Tetsushi Watanabe,et al. Common-Mode-Current Generation Caused by Difference of Unbalance of Transmission Lines on a Printed Circuit Board with Narrow Ground Pattern , 2000 .
[19] Y. Yamanaka,et al. Feasibility study for reconstruction of information from near field observations of the magnetic field of laser printer , 2006, 2006 17th International Zurich Symposium on Electromagnetic Compatibility.