期刊文献+

软件定义电磁泄漏技术与应用分析 被引量:15

Software-Defined Electromagnetic Leakage Technology and Its Application
下载PDF
导出
摘要 传统电磁信息泄漏检测侧重于无意产生的电磁泄漏,其检测和防护方法是被动式的。Soft-TEMPEST概念的提出和电磁木马的出现,使得主动泄漏技术成为电磁泄漏的新兴研究领域和重要研究方法。因此,再现设备总线和显示设备的电磁信息泄漏与还原,设计基于恶意程序的电磁主动泄漏还原基本模型,提出软件定义电磁泄漏技术及其架构,并分析该技术在电磁信息泄漏测评、电磁信息安全防护以及在跨领域安全融合等方面的重要应用价值,以及在推动网络信息安全与电磁、声、光、热、力等安全领域的融合作用。 Traditional detection of electromagnetic information leakage focuses on unintentional electromagnetic leakage,and both of its detection and protection are passive.With the proposal of Soft-TEMPEST concept and the occurrence of electromagnetic Trojan horse,active leakage technology becomes an emerging research field and important means of electromagnetic leakage.For this reason,it is necessary to reproduce the electromagnetic information leakage of the device bus and display device,and design the basic model of active electromagnetic leakage reduction based on malicious program.Finally the software-defined electromagnetic leakage technology and its architecture are proposed,and the important application value of this technology in electromagnetic information leakage assessment,electromagnetic information security protection and cross-domain security integration analyzed,thus to promote the proposed technology in the integrating role of network information security with security fields of such as electromagnetism,sound,light,heat,force and so on.
出处 《通信技术》 2017年第9期2094-2099,共6页 Communications Technology
基金 四川省科技支撑计划项目(No.2016GZ0039)~~
关键词 电磁木马 总线 漏洞挖掘 软件 防护 electromagnetic Trojan bus vulnerability mining software protection
  • 相关文献

参考文献3

二级参考文献27

  • 1邱扬,骆红廷,孙伟国,陈光达.计算机视频信息泄漏中的红信号鉴别研究[J].舰船电子工程,2004,24(z1):247-249. 被引量:1
  • 2张小武.一种新的电磁泄漏隐患——木马程序利用电磁发射传递隐藏数据的危险与防范[J].计算机安全,2005(1):22-25. 被引量:2
  • 3余祖荣.TEMPEST技术国内外发展概况[J].计算机与信息处理标准化,1996(3):52-56. 被引量:2
  • 4[1]Berke Durak. Hidden data transmission by controlling electromagnetic emanations of computers [EB/OL]. http://altern.org/berke/tempest/, 2000
  • 5[2]Markus G. Kuhn and Ross J. Anderson. Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations [A]. in David Aucsmith(ED), Information Hidding, second International Workshop [C] , USA: Portland, Oregon, 15-17, April, 1998.LNCS 1525, 124-142
  • 6[3]Highland H. J. TEMPEST over Leaking Computers [J]. Computers & Security, 1988, 13 (7): 457-458
  • 7[4]ZHANG Hongxin, Lu Yinghua. A Study on the Recognizability of Electromagnetic Leakage Information from Computer [A]. The third ASIA-PACIFIC conference on environmental electromagnetics[C], Hangzhou: 2003, 11. 65-68
  • 8[5]ZHANG Hongxin, Lu Yinghua. The Research on Video Signal Electromagnetic Radiation of Computer Based on Near-Field Testing Data [A]. The third ASIA-PACIFIC conference on environmental electromagnetics[C], Hangzhou :2003, 11. 69-72
  • 9[15]Smulders P. The Threat of Information Theft by Reception of Electromagnetic Radiation form RS-232 Cables [J]. Computers & Security, 1990, vol. 9:53-58
  • 10[16]ZHANG Hongxin, Lu Yinghua. The Study on the Recognizability of Electromagnetic Leakage Information arising from Computer [J].The Journal of China universities of Posts and Telecommunications. 2004, 11(3)

共引文献30

同被引文献42

引证文献15

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部