Whispering devices: A survey on how side-channels lead to compromised information
While operating, information processing devices or communication systems may emit
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …
Hardware-based methods for electronic device protection against invasive and non-invasive attacks
M Vidaković, D Vinko - Electronics, 2023 - mdpi.com
This paper reviews hardware-based protection methods for electronic devices,
encompassing scientific publications and published patents. This review covers insights …
encompassing scientific publications and published patents. This review covers insights …
Compromising electromagnetic emanations of wired USB keyboards
The TEMPEST methods and procedures focus on classified information carriers generated
by any electronic devices through electromagnetic radiation. Any electromagnetic radiation …
by any electronic devices through electromagnetic radiation. Any electromagnetic radiation …
Video signal recovery from the laser printer LCD display
This paper presents a new approach to the TEMPEST compromising signals emitted by the
printing devices. From the TEMPEST point of view, only the laser printer diodes and the …
printing devices. From the TEMPEST point of view, only the laser printer diodes and the …
Protection of Modular Data Centers from Cyber Attack via Electromagnetic Emanations
S Saadat - 2021 Asia-Pacific International Symposium on …, 2021 - ieeexplore.ieee.org
Both physical and cybersecurity designs are vital for Data Centers. Applying an adequate
physical security measure to prevent a possible cyber-attack is essential as part of this …
physical security measure to prevent a possible cyber-attack is essential as part of this …
Considerations on estimating the minimal level of attenuation in TEMPEST filtering for IT equipments
The main purpose of this research is to improve the security of critical computer systems with
minimal costs. One of the main problems in such cases is the secondary emissions …
minimal costs. One of the main problems in such cases is the secondary emissions …
Experimental study of shielding composite materials for protection of computer systems
V VELICU, V BUTNARIU, T Bogdan… - … on Advanced Topics …, 2021 - ieeexplore.ieee.org
This paper studies the electromagnetic shielding properties of various composite materials
with potential to be used in shielding computer systems. As data protection becomes an …
with potential to be used in shielding computer systems. As data protection becomes an …
Wireless Keyboards Communication Interception-The Balance Between Convenience and Security
A Boitan, R Bărtuşică, M Popescu… - 2018 International …, 2018 - ieeexplore.ieee.org
Wireless devices are being used more often today and anyone may ask if they are safe in
terms of the confidentiality of the information generated or handled by them. In this paper we …
terms of the confidentiality of the information generated or handled by them. In this paper we …
Synthetic Aperture Interferometric Imaging for noncooperative leack detection from shielded structures
J Adam, M Mouhamadou… - … on Antennas and …, 2020 - ieeexplore.ieee.org
This paper proposes the application of Synthetic Aperture Interferometric Imaging to the
detection of electromagnetic leakage from shielded equipment and buildings. By conducting …
detection of electromagnetic leakage from shielded equipment and buildings. By conducting …
Considerations for Emission Security Risks from the Perspective of Signal Processing Techniques
R Bărtuşică, M Popescu, A Boitan… - 2018 International …, 2018 - ieeexplore.ieee.org
The main scope of this paper is to improve the security risk analysis of critical
communication and information systems. One of the major security objectives is to ensure …
communication and information systems. One of the major security objectives is to ensure …