2014 10th International Conference on Communications (COMM) 2014
DOI: 10.1109/iccomm.2014.6866733
|View full text |Cite
|
Sign up to set email alerts
|

Considerations regarding shielding effectiveness and testing of electromagnetic protected enclosures used in communications security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…15(d)(ii), if the amplitude of the Echo radiated from the device is small, it is difficult for the attacker to reconstruct the information because of background noise. Therefore, methods to make it more difficult to obtain the Echo using conventional EM information leakage countermeasure methods, such as shielding enclosures, buildings, and connecting lines [32], [33], zoning [32], [34], [35], and jamming using noise [36], may be applied to Echo TEMPEST.…”
Section: A Methods That Make It Difficult To Obtain the Echomentioning
confidence: 99%
“…15(d)(ii), if the amplitude of the Echo radiated from the device is small, it is difficult for the attacker to reconstruct the information because of background noise. Therefore, methods to make it more difficult to obtain the Echo using conventional EM information leakage countermeasure methods, such as shielding enclosures, buildings, and connecting lines [32], [33], zoning [32], [34], [35], and jamming using noise [36], may be applied to Echo TEMPEST.…”
Section: A Methods That Make It Difficult To Obtain the Echomentioning
confidence: 99%