Method for Detecting Information Leakage from Computer Display in Electromagnetic Radiation

Author(s):  
Degang Sun ◽  
Jun Shi ◽  
Xuejie Ding ◽  
Meng Zhang ◽  
Weiqing Huang
Author(s):  
Hong-xin Zhang ◽  
Jia Liu ◽  
Jun Xu ◽  
Fan Zhang ◽  
Xiao-tong Cui ◽  
...  

Abstract The electromagnetic radiation of electronic equipment carries information and can cause information leakage, which poses a serious threat to the security system; especially the information leakage caused by encryption or other important equipment will have more serious consequences. In the past decade or so, the attack technology and means for the physical layer have developed rapidly. And system designers have no effective method for this situation to eliminate or defend against threats with an absolute level of security. In recent years, device identification has been developed and improved as a physical-level technology to improve the security of integrated circuit (IC)-based multifactor authentication systems. Device identification tasks (including device identification and verification) are accomplished by monitoring and exploiting the characteristics of the IC’s unintentional electromagnetic radiation, without requiring any modification and process to hardware devices, thereby providing versatility and adapting existing hardware devices. Device identification based on deep residual networks and radio frequency is a technology applicable to the physical layer, which can improve the security of integrated circuit (IC)-based multifactor authentication systems. Device identification tasks (identification and verification) are accomplished by passively monitoring and utilizing the inherent properties of IC unintended RF transmissions without requiring any modifications to the analysis equipment. After the device performs a series of operations, the device is classified and identified using a deep residual neural network. The gradient descent method is used to adjust the network parameters, the batch training method is used to speed up the parameter tuning speed, the parameter regularization is used to improve the generalization, and finally, the Softmax classifier is used for classification. In the end, 28 chips of 4 models can be accurately identified into 4 categories, then the individual chips in each category can be identified, and finally 28 chips can be accurately identified, and the verification accuracy reached 100%. Therefore, the identification of radio frequency equipment based on deep residual network is very suitable as a countermeasure for implementing the device cloning technology and is expected to be related to various security issues.


Author(s):  
Denys Bakhtiiarov ◽  
Oleksandr Lavrynenko ◽  
Nataliia Lishchynovska ◽  
Ivan Basiuk ◽  
Tetiana Prykhodko

Methods for synthesis a structural diagram of the processes for detecting and locating technical information leakage channels are analysed. Software for defining a controlled room zone was also presented. A proprietary approach to search the electromagnetic environment under radio interference has been developed to detect devices for unauthorized control of acoustic information using microphones and transmission of this information using a radio channel.


Author(s):  
V. V. Alekseev ◽  
◽  
V. A. Gridnev ◽  
A. V. Yakovlev ◽  
O. S. Mashkova ◽  
...  

In order to train specialists in information security (IS), a software and hardware complex “Means of protecting information from leakage through technical channels” has been developed; it provides an opportunity to study the process of information leakage through technical channels and methods of its protection, as well as apply various modules and additional software (software) that clearly demonstrate the features of various methods of information security. The composition of this complex is shown: laboratory stands simulating acoustic, vibroacoustic, acoustoelectric channels and a channel of side electromagnetic radiation and interference. At each of the stands there are information security means (ISMs) that prevent the leakage of confidential information through the corresponding technical channel. To adjust the ISMs for acoustic and vibroacoustic channels, the ISIDORA software has been developed; it allows adjusting the level of the generated acoustic interference to meet the requirements of the security of the room and at the same time to have a comfortable conversation in this room.


2021 ◽  
Vol 31 (1) ◽  
pp. 74-83
Author(s):  
S. V. Skryl ◽  
M. P. Sychev ◽  
A. V. Mazin ◽  
T. V. Meshcheryakova ◽  
O. A. Gulyaev ◽  
...  

Problem statement. The rationale for confidentiality requirements in the process of manufacturing and production testing of aviation equipment samples. There is a need to assess the effectiveness of measures to prevent information leakage through the channels of incidental electromagnetic radiation and interference and vibroacoustic channels. This situation is characteristic both for the technological equipment of the aviation industry enterprises and the equipment of the produced aircraft models.Objective. The rationale for developing the existing concept of assessing the relevance of the threats of information leakage through technical channels in the current trends of improving technical reconnaissance.Results. The article presents the analysis results of the existing regulatory and existing base of FSTEC Russia for sufficient assessment of measures to prevent information leakage through the channels of incidental electromagnetic radiation and interference and vibroacoustic channels at the enterprises of the aircraft industry in the implementation of production technologies and testing of manufactured products.Practical implications. The substantiated directions of improving the methodological basis for determining the current threats can be used in the development of methods and models for assessment of measures to prevent information leakage through the channels of electromagnetic emissions and interference and vibroacoustic channels at aircraft industry enterprises in the implementation of production technologies and testing of manufactured products.


Author(s):  
E. A. Rogozin ◽  
R. E. Rogozin ◽  
D. G. Silka ◽  
I. D. Korobkin ◽  
M. O. Meshcheryakov

Objectives. In order to determine the "security" of a special purpose informatization object, it is necessary to calculate the indicators of side electromagnetic radiation generated during the operation of devices with sensor input of information associated with information leakage through technical channels. It is also necessary to develop a list of actions to neutralize potential threats (including the development of an information protection system to protect against this type of threat).Method. The study of side electromagnetic radiation generated during the operation of devices with sensory input of information is carried out using expert documentary and instrumental methods.Result. The results of the study of side electromagnetic radiation generated during the operation of devices with sensor input of information are given and aspects of improving special measures for the protection of information at a special purpose informatization object are determined.Conclusion. The direction of this study is very relevant and requires further development of organizational and technical measures to implement the requirements of regulatory legal documents for the protection of information.


2020 ◽  
Vol 10 (2) ◽  
pp. 51-60
Author(s):  
Chinh Duc Bui ◽  
Minh The Ngo ◽  
Hao Ngoc Vinh Nguyen ◽  
Tuan Manh Pham

Abstract—   Computer keyboards are often used to enter data for a computer system, data could be normal information or confidential information such as password, key. Keyboards use electronic components so they will generate electromagnetic radiation that can reveal information. This article presents the acquisition of electromagnetic emanating from the PS/2 keyboards through different paths (in space, through power line or via LAN cable). After acquisition we develop a program on MATLAB to recover the keystroke signal from data which is obtained in the near field of PS/2 keyboard. The result of this side channel attack is recovered an average of more than 70% of the keystrokes in near field of PS/2 keyboards.  Our best attack can recover up to more than 90% of the keystrokes. From this result, we conclude that PS/2 keyboards generate electromagnetic radiations which can cause the loss of information and they are not safe to use when entering confidential information. Tóm tắt—   Bàn phím máy tính thường được sử dụng để nhập dữ liệu đầu vào cho một hệ thống máy tính, các dữ liệu có thể là văn bản thông thường hoặc thông tin cần được bảo mật như mật khẩu hay khóa. Bàn phím sử dụng các linh kiện điện tử, vì thế chúng sẽ gây ra bức xạ điện từ dẫn đến lộ lọt các thông tin khi gõ phím. Bài báo này trình bày về việc thu các tín hiệu bức xạ điện từ phát ra từ bàn phím PS/2 khi gõ phím qua các con đường khác nhau (nhiễu bức xạ trong không gian, nhiễu dẫn trên đường nguồn, qua mạng LAN). Từ đó, nghiên cứu xây dựng một module chương trình trên MATLAB để khôi phục lại tín hiệu gõ phím từ các dữ liệu thu được trong trường gần của bàn phím. Kết quả của cách tần công trên kênh kề này là khôi phục trung bình được hơn 70% ký tự được gõ trong trường gần của bàn phím PS/2. Trường hợp tốt nhất kết quả có thể lên đến hơn 90% ký tự được gõ. Từ kết quả nghiên cứu trên, nhóm nghiên cứu rút ra kết luận, các loại bàn phím[1]  PS/2 đều phát ra các bức xạ điện từ gây mất mát thông tin và không an toàn để sử dụng khi nhập các thông tin cần được bảo mật. 


2020 ◽  
Vol 30 (4) ◽  
pp. 35-46
Author(s):  
S. V. Skryl ◽  
S. S. Nikulin ◽  
A. V. Mazin ◽  
V. I. Spivak ◽  
V. O. Krylov ◽  
...  

Formulation of the problem. The completeness of the characteristics of one of the most serious threats to the security of information today – its leakage through the transient electromagnetic pulse emanation standard (TEMPEST) from computer equipment (CE) is determined not only by the number of detectable signs of leakage but also by several other parameters characterizing the dynamics of the implementation of such a threat. The established patterns in the scenarios of violators’ actions associated with the use of technical reconnaissance equipment (TRQ) to intercept informative TEMPEST signals from computer equipment made it possible to form a model of all possible options for using TRQ to obtain confidential information processed by computer equipment. The proposed model provides the implementation of the methodological principles of the recognition theory for a more complete characterization of threats of information leakage through the channels of spurious electromagnetic radiation and interference from CE in the process of their detection.Objective. Development of methodological grounds for presenting signs of the violator’s implementation of certain functions associated with the use of technical reconnaissance equipment to intercept informative signals of spurious electromagnetic radiation and interference from computer equipment as signs that identify the most significant conditions for the recognition and prevention of such threats.Results. Methodological solutions for the identification of three states significant for the prevention of threats are given based on the structuring of the functional representation of the intruder’s actions to implement such threats. Mathematical models for assessing the predicted amount of information disclosed in the process of intercepting TEMPEST informative signals from computer equipment, and assessing the level of security threats in case of interception of information are also presented.Practical significance. The paper presents the main options for the operation of a complex of programs for recognizing threats of information leakage through TEMPEST channels from computer equipment developed within the framework of the presented methodology.


Sign in / Sign up

Export Citation Format

Share Document