期刊文献+

计算机电磁信息泄漏文字再现 被引量:8

Text Recovery from EM Leakage of Computers
下载PDF
导出
摘要 设计了针对计算机电磁信息泄漏的接收和再现系统.用宽带天线截获电磁信息泄漏信号后,经带通滤波和放大,再用锁相环电路捕获帧同步与行同步信号.同步信号经模数转换后,得到视频数字信号的输出.然后,用平均滤波法对数字视频信号降噪.最后,用匹配滤波器获得再现的文字.测试结果表明,用平均滤波的方法使同步信号的信噪比提高了18.7 dB,可在12 m范围内获取奔腾486主机及阴极射线管显示器泄漏的文字信息. A text receiving and recovery system was designed for EM information leakage from computers. After EM leakage is intercepted by a broad band antenna, band-pass filtered and amplified, the vertical and horizontal synchronization signals are captured by a phase locked loop circuit. The synchronization signals are sampled and processed by an analog-digital converter to get digital video signals. Then, the noises of video signals are filtered using an average filter. At last, the text in the digital video is recovered using a matched filter. An experimental result shows that text can be recovered from EM leakage 12 m away for a Pentium 486 computer with a CRT display, and the signal to noise ratios of the vertical and horizontal synchronization signals are increased by 18.7 dB with the average filter.
出处 《西南交通大学学报》 EI CSCD 北大核心 2007年第6期653-658,共6页 Journal of Southwest Jiaotong University
基金 国家自然科学基金资助项目(60671055 60331010)
关键词 TEMPEST 电磁辐射 电磁信息泄漏 信息再现 文字 计算机 TEMPEST electromagnetic radiation EM information leakage information recovery text computer
  • 相关文献

参考文献20

  • 1DURAK B. Hidden data transmission by controlling electromagnetic emanations of computers [ EB/OL ]. [ 2000-08-02 ]. http://altern, org/berke/tempest.
  • 2KUHM M G, ANDERSON R J. Soft TEMPEST: hidden data transmission using electromagnetic emanations[ EB/OL]. [2000-08-02]. http://www, cl. cam. ac. uk.
  • 3LU Ling, NIE Yan, ZHANG Hongjin. The electromagnetic leakage and protection for computer [ C ] . 1997 International Symposium on Electromagnetic Compatibility Proceedings. Beijing: IEEE Press, 1997: 378-382.
  • 4van ECK W. Electromagnetic radiation form video display units: an eavesdropping risk? [ J]. Computers & Security, 1985, 4(4) : 269-286.
  • 5SMULDERS P. The threat of information theft by reception of electromagnetic radiation form RS-232 cables[ J]. Computers & Security, 1990, 9(1) : 53-58.
  • 6LACKEY R J, UPMAL D W. Speakeasy: the military software radio[J]. IEEE Communications Magazine, 1995, 33(5) : 56-61.
  • 7ANDERSON R J, KUHN M G. Soft TEMPEST -an opportunity for NATO[ EB/OL]. [ 2001-10-20 ]. http: ffwww, el. cam. ac. uk.
  • 8KUHN G. Optical time-domain eavesdropping risks of CRT displays [ EB/OL]. [ 2002-8-10 ]. http: //www. cl. cam. ac. uk/ - mgk25/ieee02-optical, pdf.
  • 9ROONEY S. The TEMPEST practical experience in control architecture development[ EB/OL]. [2001-10-20]. http://www. ittc. ku. edu/workshops/spartan/1998/rooney. pdf, 1998.
  • 10杜虹.TEMPEST:信息安全不容忽视的问题[J].信息安全与通信保密,2002,24(12):26-28. 被引量:8

二级参考文献60

  • 1梁晓燕,王军丽,杨健,王如龙.信息设备的电磁辐射与消除[J].广西水利水电,2004(2):108-109. 被引量:8
  • 2张洪欣,吕英华.电磁信息泄漏技术及其发展[J].安全与电磁兼容,2004(6):39-43. 被引量:16
  • 3袁祁刚,国伟.军用电子设备电磁信息防护技术[J].装备环境工程,2006,3(5):7-11. 被引量:4
  • 4余显烨.微波集成电路的格林函数法计算[M].北京:国防工业出版社,1996.24-25.
  • 5[1]SHUMPERT J D. Penetration through slots in conducting cylinders-Part1: TE case [J]. IEEE trans Antennas Propagation, 1998, 46 (11): 1612-1621.
  • 6[2]SHUMPERT J D. Penetration through slots in conducting cylinders-Part1: TM case[J]. IEEE trans Antennas Propagation, 1998, 46(11): 1622-1628.
  • 7[5]PLUMB R G. Admittance calculation of a slot in the shield of a multi-conductor transmission line[J]. IEEE trans Microwave Theory and Techniques, 1991,39 (4): 743-747.
  • 8[6]PAUL C R. Useful matrix chain parameter identities for the analysis of multi-conductor liens[J]. IEEE trans. Microwave Theory and Techniques, 1975, 23: 756-760.
  • 9[7]HARRINGTON R F. Time-harmonic electromagnetic fields [M]. New York:McGraw-Hill, 1961.
  • 10[8]PAPATHEODOROU S, MAUTZ J M, HARRINGTON R F. The aperture admittance of a circumferential slot in a circular cylinder[J]. IEEE trans Antennas Propagation, 1992, 40(2): 240-244.

共引文献51

同被引文献38

引证文献8

二级引证文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部