Citation: | XU Yanyun, “A Novel Method for Synchronization Parameters Automatic Extraction in Computer Electromagnetic Eavesdropping,” Chinese Journal of Electronics, vol. 28, no. 2, pp. 370-376, 2019, doi: 10.1049/cje.2019.01.001 |
Wim Van Eck, “Electromagnetic radiation from video display units an eavesdropping risk”, Computer & Security, Vol.4, pp.269-286, 1985.
|
Markus G. Kuhn, “Compromising emanations: Eavesdropping risks of computer displays”, University of Cambridge, Technical Report, 2003.
|
Markus G. Kuhn, “Video eavesdropping demo”, http://www.lightbluetouchpaper.org/2006/03/09/video-eavesdroppingdemo-at-cebit-2006/, 2015-8-1
|
Furkan Elibol, Ugur Sarac and Isin Erer, “Realistic eavesdropping on computer displays with low-cost and mobile receiver system”, 20th European Signal Processing Conference (EUSIPCO 2012), Bucharest, Romania, pp.1767-1771, 2012.
|
A Szilagyi and I Nicolaescu, “Evaluation of the compromising radiation by electromagnetic compatibility tests”, 20129th International Conference on Communications (COMM), Bucharest, Romania, pp. 143-145, 2012.
|
Hidenori Sekiguchi and Shinji Seto, “Study on maximum receivable distance for readiated emission of information technology equipment causing information leakage”, IEEE Transactions on Electromagnetic Compatibility, Vol.55, No.3, pp.547-554, 2013.
|
A Todri and M Marek-Sadowska, “Reliability analysis and optimization of power-gated ICs”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems”, Vol.19, No.3, pp.457-468, 2011.
|
M. Kasuya, T. Machida and K. Sakiyama. “New metric for side-channel information leakage: Case study on EM radiation from AES hardware”, 2016 URSI Asia-Pacific Radio Science Conference (URSI AP-RASC), Seoul, South Korea, pp.1288-1291, 2016.
|
A. Kumar, C. Scarborough and A. Yilmaz, “Efficient simulation of EM side-channel attack resilience”, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), Irvine, CA, USA, pp.123-130, 2017.
|
O. Soll, T. Korak and M. Muehlberghuber, “EM-based detection of hardware trojans on FPGAs”, IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Arlington, VA, USA, pp.84-87, 2014.
|
Guri, Mordechai, M. Monitz and Y. Elovici, “USBee: Air-gap covert-channel via electromagnetic emission from USB”, 14th Annual Conference on Privacy, Security and Trust (PST), pp.264-268, 2016.
|
K. Tajima, R. Ishikawa and T. Mori, et al., “A study on risk evaluation of countermeasure technique for preventing electromagnetic information leakage from ITE”, 2017 International Symposium on Electromagnetic Compatibility - EMC EUROPE, Angers, France, pp.1-4, 2017.
|
Shan W. Fu X. and Xu Z., “A secure reconfigurable crypto IC with countermeasures against SPA, DPA and EMA”, IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems, Vol.34, No.7, PP.1201-1205, 2015.
|
Wang Sen, Qiu yang and Tian jin, “Research on method for preventing digital video signal electromagnetic leakage based on visual effect”, Acta Electronica Sinica, Vol.45, No.8, pp.2038-2043, 2017. (in Chinese)
|
Bai ming, Ou naiming and Miao jungang, “The detection methods for locating the electromagnetic leakage position the surface of microwave euqipment”, Acta Electronica Sinica, Vol.43, No.6, pp.1224-1030, 2015. (in Chinese)
|
GUO Zheng, GU Dawu, YUAN Kan, et al., “A novel method for power analysis based on combinational logic in block cipher circuit”, Chinese Journal of Electronics, Vol.23, No.1, pp.151-156, 2014.
|
Yanyun Xu, Weiqing Huang and WeiFan, “Modeling and experimental research on electromagnetic information leakage from power lines” Chinese Science Information Science, Vol.45, No.10, pp.1341-1354, 2015.
|
Xu Yanyun, Jianlin Hu, Meng Zhang, et al., “Electromagnetic side channel analysis of laser facsimile”, In IEEE International Conference on Communications, Paris, France, pp.1-6, 2017.
|
Hidenori Sekiguchi and S. Seto, “Proposal of an information signal measurement method in display image contained in electromagnetic noise emanated from a personal computer”, IMTC 2007 IEEE Instrumentation and Measurement Technology Conference, Vancouver Island, British Columbia, Canada, pp.1091-5281, 2008.
|
Hidema Tanaka, “Information leakage via electromagnetic emanations and evaluation of tempest countermeasures”, International Conference on Information Systems Security, Springer-Verlag, pp.167-179, 2007.
|
Qiang Shuang and Lin Mingxiu, “Line synchronization features extraction technology of computer video leakage information”, Opto-Electronic Engineering, Vol.33, No.11, pp.105-108, 2006.
|
Xiang Changbo and Zhang Huaizhu, “Automatic synchronous signal extraction and steady display of nonstandard video information”, Journal of Data Acquisition & Processing 2007, Vol.22, No.4, pp.486-490.
|
Xun Jingjing and Wang Houjun, “A method for extracting the synchro characters in the video information leaked by a computer system”, Journal of University of Electronic Science and Technology of China, Vol.36, No.3, pp.579-582, 2007.
|
Liu Jie and Yang Yuanting, “An application based cross correlation algorithm on signal processing from leak emanation”, Journal of Astronautic Metrology and Measurement, Vol.27, No.2, pp.29-32, 2007.
|
Zhao Huan, “The research of auto-intercept and captured arithmetic to the computer divulging video signal”, Master Thesis, Northeast Normal University, China, 2008.
|
Zhang Yueying, “The research and implementation of synchronization technology for the capture platform of video information”, Master Thesis, Beijing University of Posts and Telecommunications, China, 2010.
|
Xiong Wei and Lv Yinghua, “Peak finding in the identify of video red signal spectru”, Software Magazine, Vol.33, No.11, pp.190-193, 2012.
|
Wang Xingang and Dong Xuezhi, “Application of electronic image stabilization in information reconstruction of computer video radiation,” Opto-Electronic Engineering, Vol.29, No.1, pp.62-64, 2002.
|
Liu Zhendong and Wang Jiali, “Pick-up of synchronous signal from computer based on digital spectral analysis”, Electronic Measurement Technology, Vol.30, No.9, pp.52-56, 2007.
|
Luo Hongting and Qiu Yang, “The research on identification of red signal in compromising computer emanations”, Application of Electronic Technology, No.2, pp.7-8, 2005.
|
Liu Jie and Liu Jilin, “Synchronous signal extraction and information reconstruction in compromising emanation”, Journal of Zhejiang University (Science Edition), Vol.32, No.6, pp.653-657, 2005.
|
VESA Monitor Timing Specifications, Version 1.0, Video Electronics Standards Association, September 1998.
|
Alan V. Oppenheim, Signal and Systems, 2nd Edition, Pearson Education Inc, New York, USA, 1997.
|
Z. Wang, A. C. Bovik, H. R. Sheikh, et al., “Image quality assessment: From error visibility to structural similarity”; IEEE Transactions on Image Processing, Vol.13, No.4, pp.600-612, 2004.
|
Sun D, Shi J, Wei D, et al., “Efficient and anti-interference method of synchronising information extraction for cideo leaking signal”, Signal Processing IEt, Vol.10, No.1, pp.63-68, 2016.
|