XU Yanyun, “A Novel Method for Synchronization Parameters Automatic Extraction in Computer Electromagnetic Eavesdropping,” Chinese Journal of Electronics, vol. 28, no. 2, pp. 370-376, 2019, doi: 10.1049/cje.2019.01.001
Citation: XU Yanyun, “A Novel Method for Synchronization Parameters Automatic Extraction in Computer Electromagnetic Eavesdropping,” Chinese Journal of Electronics, vol. 28, no. 2, pp. 370-376, 2019, doi: 10.1049/cje.2019.01.001

A Novel Method for Synchronization Parameters Automatic Extraction in Computer Electromagnetic Eavesdropping

doi: 10.1049/cje.2019.01.001
Funds:  This work is supported by the National Natural Science Foundation of China (No.61601460).
  • Received Date: 2018-06-27
  • Rev Recd Date: 2018-12-04
  • Publish Date: 2019-03-10
  • Electromagnetic compromising emanations are potential threat to computer security. Computer emits energy in the form of electromagnetic wave which includes the processed information. The electromagnetic wave can be received and decoded in the distance, so the unintended information leakage occurs. In this paper, the automatic information reconstruction for computer electromagnetic eavesdropping is studied. This paper attempts to combine simple digital signal processing method for the first time to extract electromagnetic leakage information. The performance of the new method is presented numerically and experimentally. Compared with other algorithms, this method has strong practicability and reliability. Under complex electromagnetic environment, the synchronization parameters can be extracted and the information can be reconstructed automatically, quickly and reliably.
  • loading
  • Wim Van Eck, “Electromagnetic radiation from video display units an eavesdropping risk”, Computer & Security, Vol.4, pp.269-286, 1985.
    Markus G. Kuhn, “Compromising emanations: Eavesdropping risks of computer displays”, University of Cambridge, Technical Report, 2003.
    Markus G. Kuhn, “Video eavesdropping demo”, http://www.lightbluetouchpaper.org/2006/03/09/video-eavesdroppingdemo-at-cebit-2006/, 2015-8-1
    Furkan Elibol, Ugur Sarac and Isin Erer, “Realistic eavesdropping on computer displays with low-cost and mobile receiver system”, 20th European Signal Processing Conference (EUSIPCO 2012), Bucharest, Romania, pp.1767-1771, 2012.
    A Szilagyi and I Nicolaescu, “Evaluation of the compromising radiation by electromagnetic compatibility tests”, 20129th International Conference on Communications (COMM), Bucharest, Romania, pp. 143-145, 2012.
    Hidenori Sekiguchi and Shinji Seto, “Study on maximum receivable distance for readiated emission of information technology equipment causing information leakage”, IEEE Transactions on Electromagnetic Compatibility, Vol.55, No.3, pp.547-554, 2013.
    A Todri and M Marek-Sadowska, “Reliability analysis and optimization of power-gated ICs”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems”, Vol.19, No.3, pp.457-468, 2011.
    M. Kasuya, T. Machida and K. Sakiyama. “New metric for side-channel information leakage: Case study on EM radiation from AES hardware”, 2016 URSI Asia-Pacific Radio Science Conference (URSI AP-RASC), Seoul, South Korea, pp.1288-1291, 2016.
    A. Kumar, C. Scarborough and A. Yilmaz, “Efficient simulation of EM side-channel attack resilience”, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), Irvine, CA, USA, pp.123-130, 2017.
    O. Soll, T. Korak and M. Muehlberghuber, “EM-based detection of hardware trojans on FPGAs”, IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Arlington, VA, USA, pp.84-87, 2014.
    Guri, Mordechai, M. Monitz and Y. Elovici, “USBee: Air-gap covert-channel via electromagnetic emission from USB”, 14th Annual Conference on Privacy, Security and Trust (PST), pp.264-268, 2016.
    K. Tajima, R. Ishikawa and T. Mori, et al., “A study on risk evaluation of countermeasure technique for preventing electromagnetic information leakage from ITE”, 2017 International Symposium on Electromagnetic Compatibility - EMC EUROPE, Angers, France, pp.1-4, 2017.
    Shan W. Fu X. and Xu Z., “A secure reconfigurable crypto IC with countermeasures against SPA, DPA and EMA”, IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems, Vol.34, No.7, PP.1201-1205, 2015.
    Wang Sen, Qiu yang and Tian jin, “Research on method for preventing digital video signal electromagnetic leakage based on visual effect”, Acta Electronica Sinica, Vol.45, No.8, pp.2038-2043, 2017. (in Chinese)
    Bai ming, Ou naiming and Miao jungang, “The detection methods for locating the electromagnetic leakage position the surface of microwave euqipment”, Acta Electronica Sinica, Vol.43, No.6, pp.1224-1030, 2015. (in Chinese)
    GUO Zheng, GU Dawu, YUAN Kan, et al., “A novel method for power analysis based on combinational logic in block cipher circuit”, Chinese Journal of Electronics, Vol.23, No.1, pp.151-156, 2014.
    Yanyun Xu, Weiqing Huang and WeiFan, “Modeling and experimental research on electromagnetic information leakage from power lines” Chinese Science Information Science, Vol.45, No.10, pp.1341-1354, 2015.
    Xu Yanyun, Jianlin Hu, Meng Zhang, et al., “Electromagnetic side channel analysis of laser facsimile”, In IEEE International Conference on Communications, Paris, France, pp.1-6, 2017.
    Hidenori Sekiguchi and S. Seto, “Proposal of an information signal measurement method in display image contained in electromagnetic noise emanated from a personal computer”, IMTC 2007 IEEE Instrumentation and Measurement Technology Conference, Vancouver Island, British Columbia, Canada, pp.1091-5281, 2008.
    Hidema Tanaka, “Information leakage via electromagnetic emanations and evaluation of tempest countermeasures”, International Conference on Information Systems Security, Springer-Verlag, pp.167-179, 2007.
    Qiang Shuang and Lin Mingxiu, “Line synchronization features extraction technology of computer video leakage information”, Opto-Electronic Engineering, Vol.33, No.11, pp.105-108, 2006.
    Xiang Changbo and Zhang Huaizhu, “Automatic synchronous signal extraction and steady display of nonstandard video information”, Journal of Data Acquisition & Processing 2007, Vol.22, No.4, pp.486-490.
    Xun Jingjing and Wang Houjun, “A method for extracting the synchro characters in the video information leaked by a computer system”, Journal of University of Electronic Science and Technology of China, Vol.36, No.3, pp.579-582, 2007.
    Liu Jie and Yang Yuanting, “An application based cross correlation algorithm on signal processing from leak emanation”, Journal of Astronautic Metrology and Measurement, Vol.27, No.2, pp.29-32, 2007.
    Zhao Huan, “The research of auto-intercept and captured arithmetic to the computer divulging video signal”, Master Thesis, Northeast Normal University, China, 2008.
    Zhang Yueying, “The research and implementation of synchronization technology for the capture platform of video information”, Master Thesis, Beijing University of Posts and Telecommunications, China, 2010.
    Xiong Wei and Lv Yinghua, “Peak finding in the identify of video red signal spectru”, Software Magazine, Vol.33, No.11, pp.190-193, 2012.
    Wang Xingang and Dong Xuezhi, “Application of electronic image stabilization in information reconstruction of computer video radiation,” Opto-Electronic Engineering, Vol.29, No.1, pp.62-64, 2002.
    Liu Zhendong and Wang Jiali, “Pick-up of synchronous signal from computer based on digital spectral analysis”, Electronic Measurement Technology, Vol.30, No.9, pp.52-56, 2007.
    Luo Hongting and Qiu Yang, “The research on identification of red signal in compromising computer emanations”, Application of Electronic Technology, No.2, pp.7-8, 2005.
    Liu Jie and Liu Jilin, “Synchronous signal extraction and information reconstruction in compromising emanation”, Journal of Zhejiang University (Science Edition), Vol.32, No.6, pp.653-657, 2005.
    VESA Monitor Timing Specifications, Version 1.0, Video Electronics Standards Association, September 1998.
    Alan V. Oppenheim, Signal and Systems, 2nd Edition, Pearson Education Inc, New York, USA, 1997.
    Z. Wang, A. C. Bovik, H. R. Sheikh, et al., “Image quality assessment: From error visibility to structural similarity”; IEEE Transactions on Image Processing, Vol.13, No.4, pp.600-612, 2004.
    Sun D, Shi J, Wei D, et al., “Efficient and anti-interference method of synchronising information extraction for cideo leaking signal”, Signal Processing IEt, Vol.10, No.1, pp.63-68, 2016.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (683) PDF downloads(222) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return