期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Hardware Trojan Detection Method Based on the Electromagnetic Leakage 被引量:1
1
作者 Lei Zhang Youheng Dong +2 位作者 Jianxin Wang Chaoen Xiao Ding Ding 《China Communications》 SCIE CSCD 2019年第12期100-110,共11页
Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficu... Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods. 展开更多
关键词 hardware trojan detection side channel analysis electromagnetic leakage principal component analysis Mahalanobis distance detection quality
下载PDF
Reciprocity principle-based model for shielding effectiveness prediction of a rectangular cavity with a covered aperture 被引量:2
2
作者 焦重庆 李月月 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第10期166-171,共6页
According to the reciprocity principle, we propose an efficient model to compute the shielding effectiveness of a rectangular cavity with apertures covered by conductive sheet against an external incident electromagne... According to the reciprocity principle, we propose an efficient model to compute the shielding effectiveness of a rectangular cavity with apertures covered by conductive sheet against an external incident electromagnetic wave. This problem is converted into another problem of solving the electromagnetic field leakage from the cavity when the cavity is excited by an electric dipole placed within it. By the combination of the unperturbed cavity field and the transfer impedance of the sheet, the tangential electric field distribution on the outer surface of the sheet is obtained. Then, the field distribution is regarded as an equivalent surface magnetic current source responsible for the leakage field. The validation of this model is verified by a comparison with the circuital model and the full-wave simulations. This time-saving model can deal with arbitrary aperture shape, various wave propagation and polarization directions, and the near-field effect. 展开更多
关键词 electromagnetic shielding electromagnetic leakage apertured cavity conductive material
下载PDF
Modeling of Radiating Aperture Using the Iterative Method
3
作者 Rafika Mejri Taoufik Aguili 《Detection》 CAS 2022年第3期29-36,共8页
We are interested in this work to electromagnetic leakage, for example the door of the microwave oven (or shielding of electronic functions working in the microwave band containing holes for ventilation circuit) which... We are interested in this work to electromagnetic leakage, for example the door of the microwave oven (or shielding of electronic functions working in the microwave band containing holes for ventilation circuit) which must be transparent (chain link) but the level of electromagnetic leakage issued by this device must not exceed certain standards. This work started with this article in which we are interested in a simple structure consisting of a multilayer structure incorporating a radiating aperture. We show in this paper mainly the interests of this study and the limitations of using these structures. Modeling of this device is provided by the wave concept iterative procedure (WCIP) which is simple to implement and is characterized by the fast execution method. The validation of our work is carried out by comparing our results with those calculated by the Ansoft HFSS software which shows a good agreement. 展开更多
关键词 electromagnetic leakage Radiating Aperture MICROWAVE Iterative Method Planar Structure MULTILAYER electromagnetic Shielding
下载PDF
Video information recovery from EM leakage of computers based on storage oscilloscope 被引量:1
4
作者 Wenhan YANG Yinghua LU Jun XU 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2010年第2期143-146,共4页
A hardware platform using broadband antenna,oscilloscope,and spectrum analyzer is designed to receive radio frequency(RF)signals from electromagnetic radiation leakage of computers in the office environment.The proces... A hardware platform using broadband antenna,oscilloscope,and spectrum analyzer is designed to receive radio frequency(RF)signals from electromagnetic radiation leakage of computers in the office environment.The process of receiving and the processing techniques have also been given.Then,the software radio-based computing models and software algorithms are proposed to demodulate and decode the RF signals.An experimental result shows that the text information can be recovered from electromagnetic(EM)leakage wave of computer by this interception system.This architecture not only reduces the cost of the system’s hardware but also makes interception more flexible.The innovation points of this paper are recovering the video information in EM leakage wave of computers in an ordinary office environment based on public equipments and proposing the process of receiving processing techniques that only use the software radiobased computing models and software algorithms. 展开更多
关键词 Transmitted electromagnetic Pulse/Energy Standards and Testing(TEMPEST) electromagnetic leakage wave video information recovering software radio
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部