Electromagnetic information leakage acquisition and pretreatment

被引:0
|
作者
Gan, Han [1 ]
Zhang, Hongxin [1 ,2 ]
Zhang, Fan [3 ]
Zhao, Xinjie [4 ]
He, Pengfei [5 ]
机构
[1] School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China
[2] Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications, Beijing, China
[3] College of Information Science and Electrical Engineering, Zhejiang University, Hangzhou, China
[4] Institute of North Electronic Equipment, Beijing, China
[5] School of Opto-Electronic Information Science and Technology, Yantai University, Yantai, China
关键词
Taylor series;
D O I
10.13443/j.cjors.2014102103
中图分类号
学科分类号
摘要
In the study of differential electromagnetic attack, alignment processing is the key to the attack success. In trace alignment process, the method of Taylor series expansion is proposed to get noise offset on the base of phase correlation function. By the method of maxima extraction technology of aligned data, the dimensionality reduction of electromagnetic leakage curve is achieved, and the attack complexity is reduced. A new criterion is proposed to detect the alignment effect by Euclidean distance. Experiment results demonstrate that the fluctuation degree of the unaligned trace. Euclidean distance is obvious with a larger margin than the aligned trace within certain dimensions. The degree of trace alignment can be determined by the Euclidean distance fluctuations level. Copyright © 2015 by Editorial Department of Chinese Journal of Radio Science
引用
收藏
页码:1004 / 1008
相关论文
共 50 条
  • [41] Experimental Demonstration of Electromagnetic Information Leakage From Modern Processor-Memory Systems
    Zajic, Alenka
    Prvulovic, Milos
    IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, 2014, 56 (04) : 885 - 893
  • [42] A method for detecting image information leakage risk from electromagnetic emission of computer monitors
    Mao, Jian
    Liu, Jinming
    Zhang, Jiemin
    Han, Zhenzhong
    Shi, Sen
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 40 (02) : 2981 - 2991
  • [43] Electromagnetic Side Channel Information Leakage Created by Execution of Series of Instructions in a Computer Processor
    Yilmaz, Baki Berkay
    Prvulovic, Milos
    Zajic, Alenka
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 776 - 789
  • [44] Improved characteristics of countermeasure method for image information leakage by electromagnetic radiation from ITE
    Tajima, Kimihiro
    Nobata, Hitoshi
    Suzuki, Yasunao
    Tominaga, Tetsuya
    Ishikawa, Ryo
    Kato, Jun
    PROCEEDINGS OF THE 2020 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC EUROPE), 2020,
  • [45] A study on risk evaluation of countermeasure technique for preventing electromagnetic information leakage from ITE
    Tajima, Kimihiro
    Ishikawa, Ryo
    Mori, Toshinori
    Suzuki, Yasunao
    Takaya, Kazuhiro
    2017 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY - EMC EUROPE, 2017,
  • [46] The electromagnetic leakage and protection for computer
    Lu, L
    Nie, Y
    Zhang, HJ
    1997 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, PROCEEDINGS, 1997, : 378 - 382
  • [47] Information Leakage in the Cloud
    Mughal, Bilal Karim
    Syed, Aisha
    Khan, Asma
    2014 INTERNATIONAL CONFERENCE ON OPEN SOURCE SYSTEMS AND TECHNOLOGIES (ICOSST), 2014, : 56 - 61
  • [48] Quantum information leakage
    Gabriella Graziano
    Nature Reviews Chemistry, 2020, 4 : 170 - 170
  • [49] Competition and Information Leakage
    Baldauf, Markus
    Mollner, Joshua
    JOURNAL OF POLITICAL ECONOMY, 2024, 132 (05) : 1603 - 1641
  • [50] Axioms for Information Leakage
    Alvim, Mario S.
    Chatzikokolakis, Konstantinos
    McIver, Annabelle
    Morgan, Carroll
    Palamidessi, Catuscia
    Smith, Geoffrey
    2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, : 77 - 92