2018 International Conference on Applied and Theoretical Electricity (ICATE) 2018
DOI: 10.1109/icate.2018.8551437
|View full text |Cite
|
Sign up to set email alerts
|

Detection of electromagnetic emissions transmitted on the power line through electrical conduction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…In the TEMPEST evaluation process, all digital signals transferred from the communication ports of the tested equipment are considered to be compromising signals, such as PS/2 port connector [1], USB (Universal Serial Bus ports or peripherals) [2,3], RJ45 modular connector [4], video signals from VGA (Video Graphics Array), DVI (Digital Visual Interface), HDMI (High-Definition Multimedia Interface) and other display ports [5][6][7] or RS232 serial port [8]. Output devices such as printers [9][10][11][12] and video projectors [13] are also being investigated.…”
Section: Introductionmentioning
confidence: 99%
“…In the TEMPEST evaluation process, all digital signals transferred from the communication ports of the tested equipment are considered to be compromising signals, such as PS/2 port connector [1], USB (Universal Serial Bus ports or peripherals) [2,3], RJ45 modular connector [4], video signals from VGA (Video Graphics Array), DVI (Digital Visual Interface), HDMI (High-Definition Multimedia Interface) and other display ports [5][6][7] or RS232 serial port [8]. Output devices such as printers [9][10][11][12] and video projectors [13] are also being investigated.…”
Section: Introductionmentioning
confidence: 99%
“…The information infiltration process represents the access to information processed by the equipment through reception and processing techniques of electromagnetic emissions generated by the targeted equipment without having physical access to it. The risks associated with the process of electromagnetic infiltration are very often described and analyzed in relation to computers [5][6][7], monitors [5,[8][9][10][11] or laser printers [12][13][14][15]. Each such device becomes a source of undesirable emissions, which enable non-invasive acquisition of information.…”
Section: Introductionmentioning
confidence: 99%
“…Each device is a source of valuable emissions which allow to reconstruct primary information. The information become visible, readable and intelligible ( [4][5][6][7], Figure 1). It is possible because information is processed in graphic form.…”
Section: Introductionmentioning
confidence: 99%