2018 International Conference on Applied and Theoretical Electricity (ICATE) 2018
DOI: 10.1109/icate.2018.8551420
|View full text |Cite
|
Sign up to set email alerts
|

Study of shielding effectiveness on spurious emissions of information systems by means of metallic and carbon powder screens

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…The effectiveness of the electromagnetic infiltration can be limited in several ways: limiting levels of electromagnetic emissions correlated (having distinctive features) with processed information [14][15][16][17], a disturbance of existing revealing emissions [18,19] or appropriate shaping of the emission source to eliminate features that enable identification e.g., of text data characters [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…The effectiveness of the electromagnetic infiltration can be limited in several ways: limiting levels of electromagnetic emissions correlated (having distinctive features) with processed information [14][15][16][17], a disturbance of existing revealing emissions [18,19] or appropriate shaping of the emission source to eliminate features that enable identification e.g., of text data characters [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…The risk of electromagnetic infiltration has also been studied for peripheral communications of personal computers (PC), such as the keyboard, whether it is USB [16,17] or PS/2 [16,18,19] type, RS-232 communication cable [20] that is still used in many existing implementations, USB devices [21], Ethernet communication [22] or VGA video graphics array connectors [9]. In [23], researchers performed studies and measurements for several shielding configurations for the electromagnetic screens and their suitability and efficiency of the electromagnetic emissions of information systems, while in [24] the authors performed channel measurements to evaluate the electromagnetic emanation security in the 200-1000 MHz frequency bandwidth, and proposed some adaptive security limits that depends on the total radio attenuation and on the extent of required confidentiality. In [25], researchers presented several testing and countermeasure methods against electromagnetic security threats and some a risk evaluation method of countermeasure technique for preventing electromagnetic information leakage is studied, based on the International Telecommunication Union (ITU) recommendation [26].…”
Section: Introductionmentioning
confidence: 99%
“…In these cases, both hard and soft solutions are used. Electromagnetic shielding, electromagnetic gaskets, power and signal filters, and ferrites are the most popular technical solutions to limit levels of electromagnetic emissions [8,9]. To counteract the electromagnetic eavesdropping process, a software solution can be used [3].…”
Section: Introductionmentioning
confidence: 99%