期刊文献+

显示器电磁木马的Soft-TEMPEST技术研究 被引量:7

Research on Soft-TEMPEST technology for monitor electromagnetic trojans
下载PDF
导出
摘要 显示器电磁木马是通过控制计算机屏幕电磁辐射达到窃取信息目的的一种新型木马。当前的主流防护思想是用软件防护代替较为成熟但造价昂贵的硬件防护机制,然而目前软防护思想大多侧重于理论方法的探索,在实现机制上相对比较复杂。针对显示器电磁木马的工作特点提出了Soft-TEMPEST防护机制,设计了显示器电磁木马的ADFA(API Detection and Frequency Analysis)检测方法。该方法通过API函数序列的周期性挖掘分析,结合对屏幕像素信息的傅里叶变换及频谱分析,达到检测出木马进程的目的。测试结果表明,该方法能够成功检测出多种显示器电磁木马,而且原理简单,方便投入使用。 Display electromagnetic trojan is a new type of trojans that steal information through the control of com- puter screen electromagnetic radiation. The mainstream protection idea is that software protections substitute hard- ware protections mechanism which is more mature, but high cost. However, the current soft protections mostly come from the perspective of theoretical methods, which results in a relative complex implementation. This paper propos- es a mechanism of Soft-TEMPEST against monitor electromagnetic trojans and designs a method ADFA (APIs De- tection and Frequency Analysis). The ADFA detects monitor electromagnetic trojans by cyclical mining API func- tion sequences with Fourier transform of screen pixel information and spectrum analysis. The test results show that the method can successfully detect many types of monitor electromagnetic trojans. What is more, it is simple and can be easily put into use.
出处 《计算机工程与应用》 CSCD 2012年第27期63-68,共6页 Computer Engineering and Applications
基金 国家自然科学基金(No.60903204)
关键词 电磁木马 基于软件的瞬时电磁脉冲发射监测技术(Soft-TEMPEST) 应用程序编程接口(API)周期挖掘 傅里叶变换 频谱分析 electromagnetic trojan Soft-Transient Electromagnetic Pulse Emanation Surveillance Technology ( TEMPE ST ) Application Programming Interface (API) cyclical mining Fourier transform spectrum analysis
  • 相关文献

参考文献5

二级参考文献18

  • 1韩放.计算机视频屏蔽电缆的电磁泄漏[J].电子学报,1993,21(3):45-49. 被引量:2
  • 2袁晓光.Soft Tempest技术分析.第10届全国抗恶劣环境计算机学术年会论文集[M].,2000.156-161.
  • 3杨继深.外设的TEMPEST设计.第4届全国抗恶劣环境计算机学术年会论文集[M].,1993..
  • 4Han Jiawci, Dong Guozhu, Yin Yiwen. Efficient Mining of Partial Periodic Patterns in Time Series Databases[C]//Proc. of the 15th int'l Conf. on Data Engineering. Sydney, Australia: [s. n.], 1999: 106-115.
  • 5Aref W G, Elfeky M G, Elmagarmid A K. Incremental, Online and Merge Mining of Partial Periodic Patterns in Time Series Databases[J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(3): 332-342.
  • 6Elfeky M, Aref W, Elmagarmid A. Periodicity Detection in Time Series Databases[J]. IEEE Transactions on Knowledge and Data Mining, 2005, 17(7): 875-887.
  • 7Elfeky M G, Aref W G, Elmagarmid A K. WARP: Time Warping for Periodicity Detection[C]//Proc. of the 15th IEEE Int'l Conf. on Data Mining. [S. l]: IEEE Press, 2005: 138-145.
  • 8PapadJmitriou S, Brockwell A, Faloutsos C. AWSOM: Adaptive, Hands-off Stream Mining[C]//Proc. of the 29th Int'l Conf. on Very Large Databases. Berlin, Germany: [s. n.], 2003:560-571.
  • 9Chen Lei, Ng R. On the Marriage of Lp-norm and Edit Distance[C]//Proc. of the 30th International Conference on Very Large Database. Toronto, Canada: [s. n.], 2004: 792-803.
  • 10[1]Ott Henry W. Noise Reduction Techniques System, John Wiley & Sons[M]. Inc., 1988

共引文献11

同被引文献48

  • 1杨成,黄贤俊,刘培国.基于能量选择表面的电磁防护新方法[J].河北科技大学学报,2011,32(S2):81-84. 被引量:18
  • 2刘德修,郭万里,樊昌信.计算机信息泄漏的机理分析[J].西安电子科技大学学报,1993,20(2):74-79. 被引量:6
  • 3张洪欣,吕英华.电磁信息泄漏技术及其发展[J].安全与电磁兼容,2004(6):39-43. 被引量:16
  • 4曹瀚文,王文博.GNU Radio:开放的软件无线电平台[J].电信快报(网络与通信),2007(4):31-34. 被引量:24
  • 5van Eck W. Electromagnetic radiation from video display units: an eavesdropping risk. Comput Secur, 1985, 4: 269-286.
  • 6Highland H J. TEMPEST over leaking computer. Comput Secur, 1988, 13:457-458.
  • 7Szilagyi A, Nicolaescu I. Evaluation of the compromising radiation by electromagnetic compatibility tests. In: Inter- national Conference on Communications. Bucharest: IEEE Press, 2012. 143-145.
  • 8Elibol F, Sarac U, Erer I. Realistic eavesdropping attacks on computer displays with low-cost and mobile receiver system. In: Proceedings of the 20th European Signal Processing Conference. Bucharest Romania: IEEE Press, 2012. 1767-1771.
  • 9Auddy A, Sahu S. Tempest: magnitude of threat and mitigation techniques. In: 10th International Conference on Electromagnetic Interference Compatibility. Bangalore: IEEE Press, 2008. 603-611.
  • 10Suzuki Y, Akiyama Y. Jamming technique to prevent information leakage caused by unintentional emissions of PC video signals. In: IEEE International Symposium on Electromagnetic Compatibility. Fort Lauderdale: IEEE Press, 2010. 132 -137.

引证文献7

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部