2023
DOI: 10.1109/temc.2023.3252636
|View full text |Cite
|
Sign up to set email alerts
|

Echo TEMPEST: EM Information Leakage Induced by IEMI for Electronic Devices

Abstract: Electromagnetic (EM) information leakage encourages attacks, wherein the attackers passively capture and analyze EM waves that are unintentionally generated by devices. Generally, devices with weak EM emission intensities are not targeted. However, even these devices would be subject to attacks if it becomes possible to actively sense the electrical changes that occur within them when information is processed. This article demonstrates the feasibility of the information leakage threat induced by the active sen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Within the domain-specific literature, the computing devices compromising electromagnetic emanations' study are addressed, at a general level, in several papers, such as [16][17][18]. In work [16], the authors present how electromagnetic emanation security breaches can be exploited using economically affordable instrumentation to eavesdrop on the interest's signals.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Within the domain-specific literature, the computing devices compromising electromagnetic emanations' study are addressed, at a general level, in several papers, such as [16][17][18]. In work [16], the authors present how electromagnetic emanation security breaches can be exploited using economically affordable instrumentation to eavesdrop on the interest's signals.…”
Section: Related Workmentioning
confidence: 99%
“…In the same manner, paper [18] highlights the feasibility of information leakage, emphasizing the integrated circuits (IC), elements that depict the key of the current electronic devices [19].…”
Section: Related Workmentioning
confidence: 99%
“…Typically, devices exhibiting weak EM emission intensities are not the primary targets. In [255] categorizes this threat as "Echo TEMPEST." Validation is conducted on diverse components, including an evaluation board simulating the I/O circuit of the IC, UART modules, and USB key-boards.…”
Section: Side Channel Protection Countermeasuresmentioning
confidence: 99%