期刊文献+

计算机键盘电磁信息泄漏及其防护研究 被引量:2

Study on electromagnetic compromising emanations of computer keyboard and its protection
下载PDF
导出
摘要 在研究PS/2键盘控制模块的时钟与数据信号接口电路结构特征的基础上,利用电路等效的方法研究了键盘电磁泄漏发射与信息还原机理,通过测试实验验证了该方法的有效性;进一步提出了两种电磁泄漏防护方式,具体设计了一种电磁泄漏防护方案。实验测试结果表明,该方案能够有效抑制键盘的电磁发射,防止按键信息通过电磁发射被还原。 This paper studied the circuit structure characteristic of data and clock signal interface in the PS/2 keyboard’s control module.On this basis,it used the method of equivalent circuit to research the electromagnetic compromising emanations and its information recovery mechanism,the effectiveness of which was test and verified by a later measurement experiment.Furthermore,it proposed two different ways of security protection,and designed a shielding protection method against compromising emanations of keyboard.It is demonstrated by the result of the experiment that electromagnetic emission of keyboard is suppressed effectively and good protection effect against keystroke recovery is reached.
作者 王利涛 郁滨
出处 《计算机应用研究》 CSCD 北大核心 2012年第7期2708-2711,共4页 Application Research of Computers
关键词 电磁信息泄漏 信息安全 下降沿 安全防护 electromagnetic compromising emanations information security falling edge security protection
  • 相关文献

参考文献13

  • 1YOUNG J. NSA tempest documents[EB/OL].http://cryptome.info/0001/nsa-tempest.htm,2010.
  • 2Van ECK W. Electromagnetic radiation from video display units:an eavesdropping risk[J].Computers and Security,1985,(04):269-286.
  • 3韩放.计算机信息电磁泄漏与防护[M]北京:科学出版社,1993.
  • 4KUHN M G. Compromising emanations:eavesdropping risks of computer displays[EB/OL].http://www.cl.cam.ac.uk/TechReports/UCA M-CL-TR-577.pdf,2010.
  • 5KUHN M.G. Security limits for compromising emanations[A].Beilin:Springer-Verlag,2005.265-279.
  • 6董士伟,许家栋.CRT显示器信息电磁泄漏保熵性研究[J].电子与信息学报,2004,26(3):405-409. 被引量:2
  • 7张洪欣,吕英华,贺鹏飞,王海侠.计算机电磁信息泄漏文字再现[J].西南交通大学学报,2007,42(6):653-658. 被引量:8
  • 8TOSAKA T,TAIRA K,YAMANAKA Y. Electromagnetic security for electromagnetic disturbance that contains information[A].2006.
  • 9TOSAKA T,TAIRA K,YAMANAKA Y. Feasibility study for reconstruction of information from near field observations of the magnetic field of a laser printer[A].2006.630-633.
  • 10SMULDER S P. The threat of information theft by reception of electromagnetic radiation from RS-232 cables[J].Computers and Security,1990,(01):53-58.

二级参考文献22

  • 1张洪欣,吕英华,韩宇南,车树良,贺鹏飞.多导体连接器孔隙电磁辐射信息泄漏效应研究[J].哈尔滨工程大学学报,2004,25(4):517-520. 被引量:2
  • 2张洪欣,吕英华,邱玉春,车树良.计算机电磁信息泄漏阈值效应研究[J].通信学报,2004,25(10):87-92. 被引量:5
  • 3ZHANGHong-xin,LUYing-hua,QIUYu-chun,CHENDa-qing.The Study of the Recognizability of Electromagnetic Leakage Information Arising from Computer[J].The Journal of China Universities of Posts and Telecommunications,2004,11(2):80-85. 被引量:5
  • 4董文彬 殷明 康四军.并行复合源电磁信息泄漏的非保熵性[A]..微波电磁兼容及超高频移动通信技术第三届全国学术会议论文集[C].湖南张家界,Oct1996.45-52.
  • 5R.米特拉著 金元松译.计算机技术在电磁学中的应用[M].北京:人民邮电出版社,1983.197-207.
  • 6DURAK B. Hidden data transmission by controlling electromagnetic emanations of computers [ EB/OL ]. [ 2000-08-02 ]. http://altern, org/berke/tempest.
  • 7KUHM M G, ANDERSON R J. Soft TEMPEST: hidden data transmission using electromagnetic emanations[ EB/OL]. [2000-08-02]. http://www, cl. cam. ac. uk.
  • 8LU Ling, NIE Yan, ZHANG Hongjin. The electromagnetic leakage and protection for computer [ C ] . 1997 International Symposium on Electromagnetic Compatibility Proceedings. Beijing: IEEE Press, 1997: 378-382.
  • 9van ECK W. Electromagnetic radiation form video display units: an eavesdropping risk? [ J]. Computers & Security, 1985, 4(4) : 269-286.
  • 10SMULDERS P. The threat of information theft by reception of electromagnetic radiation form RS-232 cables[ J]. Computers & Security, 1990, 9(1) : 53-58.

共引文献8

同被引文献10

  • 1张洪欣,吕英华.电磁信息泄漏技术及其发展[J].安全与电磁兼容,2004(6):39-43. 被引量:16
  • 2HATCH A, WILLIAMS resonance mechanism of gas breakdown[J]. IEEE 1954, 25(4): 417-423. H. The secondary electron low-pressure high-frequency Journal of Applied Physics,.
  • 3SHITVOV A P, ZELENCHUK D E, SCHUCHINSKY A G V. Passive intermodulation in printed lines[J]. lET Miceow. Antennas Propag., 2007, 3(2)= 260-268.
  • 4YU M. Power-handling capability for rf filters[J].Microwave Magazines, 2007, 8(5): 88-97.
  • 5B STANDAROS. Space engineering: Multipacting design and test, vol. ECSS-20-01A[R]. The Netherlands: ESA Publication Division, ESA-ESTEC, 2003.
  • 6LI J, CAO R G, LI S Z. The development of EML technology in China [J]. IEEE Transactions on Plasma Science, 2013, 41(5): 1-5.
  • 7Y YAMAMOTO, KUGA N. Short-circuit transmission line method for PIM evaluation of metallic materials[J]. IEEE Journal and Magazine, 2007, 49(3) : 682-688.
  • 8YU X M, TANG X H, TANG D. High-stability connection method for the inner conductor of high- power vacuum coaxial resonator[J]. PIERL, 41(1)~ 1-10.
  • 9沈家楠.谈谈TEMPEST技术[J].系统工程与电子技术,1990,12(10):53-60. 被引量:2
  • 10孙德刚.TEMPEST:隐蔽通道的信息泄漏与防护[J].计算机安全,2002(19):16-19. 被引量:1

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部