2015
DOI: 10.1109/temc.2015.2466593
|View full text |Cite
|
Sign up to set email alerts
|

Noise-Jamming Effect as a Countermeasure Against TEMPEST During High-Speed Signaling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…15(d)(ii), if the amplitude of the Echo radiated from the device is small, it is difficult for the attacker to reconstruct the information because of background noise. Therefore, methods to make it more difficult to obtain the Echo using conventional EM information leakage countermeasure methods, such as shielding enclosures, buildings, and connecting lines [32], [33], zoning [32], [34], [35], and jamming using noise [36], may be applied to Echo TEMPEST.…”
Section: A Methods That Make It Difficult To Obtain the Echomentioning
confidence: 99%
“…15(d)(ii), if the amplitude of the Echo radiated from the device is small, it is difficult for the attacker to reconstruct the information because of background noise. Therefore, methods to make it more difficult to obtain the Echo using conventional EM information leakage countermeasure methods, such as shielding enclosures, buildings, and connecting lines [32], [33], zoning [32], [34], [35], and jamming using noise [36], may be applied to Echo TEMPEST.…”
Section: A Methods That Make It Difficult To Obtain the Echomentioning
confidence: 99%
“…Nowadays, many scholars have begun to actively research and develop TEMPEST [2][3][4][5][6], especially TEMPEST protection. Many methods of TEM-PEST protection have been achieved, for example, low-radiation equipment [7][8][9][10], noise interference [11], electromagnetic shielding [12][13][14], filtering technology [15], and optical fiber technology [16,17]. Low-radiation equipment, noise interference, electromagnetic shielding, and optical fiber technology mainly prevent electromagnetic information leakage caused by electromagnetic radiation.…”
Section: Introductionmentioning
confidence: 99%
“…This can be a potential information security threat, especially because information can then be stolen remotely from a distance with no trace [ 3 , 4 ] . In most cases, the net security and the information storage security are emphasized while the information security caused by the non‐contacting electromagnetic radiation is often neglected [ 5 , 6 ] .…”
Section: Introductionmentioning
confidence: 99%