2013
DOI: 10.1587/transcom.e96.b.2639
|View full text |Cite
|
Sign up to set email alerts
|

Emission Security Limits for Compromising Emanations Using Electromagnetic Emanation Security Channel Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 5 publications
0
12
0
Order By: Relevance
“…The video display signal is considered to be the most unsafe in terms of vulnerability to electromagnetic intrusion attacks from all compromising signals that can be emitted by a personal computer. This is also recognized by the TEMPEST procedures [14], which assign to this type of signal the most restrictive corresponding category as a compromising signal. The successive video frames are similar to each other and, for this reason, the video signal has the attributes of a repetitive signal, which means that it is almost periodic [15].…”
Section: Introductionmentioning
confidence: 86%
See 1 more Smart Citation
“…The video display signal is considered to be the most unsafe in terms of vulnerability to electromagnetic intrusion attacks from all compromising signals that can be emitted by a personal computer. This is also recognized by the TEMPEST procedures [14], which assign to this type of signal the most restrictive corresponding category as a compromising signal. The successive video frames are similar to each other and, for this reason, the video signal has the attributes of a repetitive signal, which means that it is almost periodic [15].…”
Section: Introductionmentioning
confidence: 86%
“…The effectiveness of the electromagnetic infiltration can be limited in several ways: limiting levels of electromagnetic emissions correlated (having distinctive features) with processed information [14][15][16][17], a disturbance of existing revealing emissions [18,19] or appropriate shaping of the emission source to eliminate features that enable identification e.g., of text data characters [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…Protection of information against electromagnetic eavesdropping in modern electronic systems is a big challenge. Such kind of eavesdropping is connected with electromagnetic emissions which are correlated with processed information [1][2][3]. This problem increases with a higher and higher use of electronic devices for processing and transmitting information.…”
Section: Introductionmentioning
confidence: 99%
“…The electromagnetic emissions with distinctive features can arise at any stage of processing of information (e.g. transmission, displaying on screen, printing) which occur in the electric form [1,[4][5][6][7][8]. Video signals are particularly dangerous (Figure 1) [9,10].…”
Section: Introductionmentioning
confidence: 99%
“…This signal is transmitted from a computer to a screen or to a laser printer. In this case, this signal become a source of electromagnetic emissions which have characteristics of this signal [3,4,5]. This phenomenon makes it possible to reconstruct every processed character and thus all text displayed on the screen or printed on the laser printer.…”
Section: Introductionmentioning
confidence: 99%