期刊文献+

计算机电磁信息泄漏阈值效应研究 被引量:5

Study of threshold effects of information leakage arising from computer
下载PDF
导出
摘要 基于进场实测数据,建立了计算机视频信号的电磁辐射模型,利用计算电磁学的方法定量地研究了计算机视频信号的电磁辐射强度;提出了信息泄漏阈值和信息识别度的概念,进一步研究了信息泄漏阈值与信息识别度的关系以及信息识别度与接收距离的关系;定量地研究了电磁泄漏信息截获与再现的关键因素和条件。 The video signal electromagnetic radiation model was set up based on near-field testing data of computer radiation, and the strength of video electromagnetic radiation was investigated in quantification by using computational electromagnetics method. Further more, the concepts of threshold of information leakage and information identification resolution were proposed. At last, the relation of threshold of information leakage and information identification resolution, and the relation of information identification degree and interception distance were studied. The key factors and conditions of the electromagnetic information leakage were studied in quantification.
出处 《通信学报》 EI CSCD 北大核心 2004年第10期87-92,共6页 Journal on Communications
基金 国家自然科学基金资助项目(60271018)
关键词 电磁辐射 信息泄漏 信息再现 信息泄漏阈值 信息识别度 electromagnetic radiation information leakage information reconstruction threshold of information leakage information identification degree
  • 相关文献

参考文献19

  • 1BERKE D. Hidden data transmission by controlling electromagnetic emanations of computers [EB/OL]. http://altern.org/berke/tempest/, 2000.
  • 2KUHN M G, ANDERSON R J. Soft tempest: hidden data transmission using electromagnetic emanations[EB/OL]. http://www.cl. cam.ac.uk/ ~mgk25/ih98-tempest-slides.pdf, 2001.
  • 3ANDERSON R J, KUHN M G. Soft TEMPEST-an opportunity for NATO[EB/OL]. http://www.cl.cam.ac.uk, May, 2000.
  • 4VAN E W. Electromagnetic radiation form video display units: an eavesdropping risk? [J]. Computers & Security, 1985,4: 69-286.
  • 5LU L, NIE Y, ZHANG H J. The electromagnetic leakage and protection for computer[A]. Electromagnetic Compatibility Proceedings, 1997 International Symposium on EMC[C]. Beijing, 1997. 378-382.
  • 6SMULDERS P. The threat of information theft by reception of electromagnetic radiation form RS-232 cables[J]. Computers & Security, 1990, 9: 53-58.
  • 7DEMOULIN B, KONE L, POUDROUX C. Electromagnetic radiation of shielded data transmission lines[A]. Symposium on Electromagnetic Security for Information Protection[C]. Rome, Italy, 1991. 163-173.
  • 8LACKEY R J, UPMAL D W. Speakeasy: the military software radio[J]. IEEE Communications Magazine, 1995, 33(5): 56-61.
  • 9CHEN H Y, TARN I Y. Analysis of electromagnetic radiation from a video output amplifier inside a monitor by using FDTD method[J]. IEEE Trans EMC, 1997, 39(4): 394-397.
  • 10王莉,史应文.低频段机箱屏蔽仿真的研究[J].太原理工大学学报,1999,30(3):278-280. 被引量:2

二级参考文献26

  • 1王长青.电磁场计算中的时域有限差分法[M].北京:北京大学出版社,1994.18-30,57-60.
  • 2Van W E. Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?. Computer and Security,1985, (4): 269-286.
  • 3Smulders P. The Threat of Information Theft by Reception of Electromagnetic Radiation from RS--232 Cables. Computer and Security, 1985, (9): 53-58.
  • 4Sebastiani S. Characterization to a TEMPEST Testing Laboratory and Methodology for Control to Compromising Emanation. IEEE International symposium on EMC. Denver: 1998, 165-70.
  • 5Han Fang. Radiation Emission From CRT of Computer VDU. IEEE International Symposium on EMC, Washington D.C., 1990, 483-487.
  • 6Dong Shiwei, Xu Jiadong, Zhang Haobin, et al. On Compromising Emanations from Computer VDU and Its Interception. Proceedings of EMC 2002, 2002 3rd International Symposium on Electromagnetic Compatibility, Beijing,China: 2002. 692-695.
  • 7BERKE D. Hidden data transmission by controlling electromagnetic emanations of computers[EB/OL], http://altem.org/berke/tempest/, 2000.
  • 8KUHN M G, ANDERSON R J. Soft Tempest: hidden data transmission using electromagnetic emanations[EB/OL]. http://www.cl.cam.ac.uk/~mgk25/ih98-tempest-slides.pdf,2001.
  • 9ANDERSON R J, KUHN M G Soft TEMPEST-An opportunity for NATO[EB/OL]. http://www.cl.cam.ac.uk, May, 2000.
  • 10VAN E W. Electromagnetic radiation form video display units: an eavesdropping risk?[J]. Computers & Security, 1985, 4: 69-286.

共引文献35

同被引文献51

引证文献5

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部