z-logo
open-access-imgOpen Access
Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure
Author(s) -
Masahiro Kinugawa,
Daisuke Fujimoto,
Yu-ichi Hayashi
Publication year - 2019
Publication title -
iacr transactions on cryptographic hardware and embedded systems
Language(s) - English
Resource type - Journals
ISSN - 2569-2925
DOI - 10.46586/tches.v2019.i4.62-90
Subject(s) - leakage (economics) , information leakage , electromagnetic radiation , electromagnetic environment , electrical engineering , electronics , extortion , electromagnetic pulse , electronic engineering , acoustics , engineering , computer science , computer security , physics , optics , law , political science , economics , macroeconomics
The problem of information leakage through electromagnetic waves for various devices has been extensively discussed in literature. Conventionally, devices that are under such a threat suffer from potential electromagnetic information leakage during their operation. Further, the information inside the devices can be obtained by monitoring the electromagnetic waves leaking at the boundaries of the devices. The leakage of electromagnetic waves, however, was not observed for some devices, and such devices were not the target of the threat discussed above. In light of this circumstance, this paper discusses an “interceptor” that forces the leakage of information through electromagnetic waves, even from devices in which potential electromagnetic leakage does not occur. The proposed interceptor is a small circuit consisting of an affordable semiconductor chip and wiring and is powered by electromagnetic waves that irradiate from the outside of a device as its driving energy. The distance at which information is obtained is controlled by increasing the intensity of the irradiated electromagnetic waves. The paper presents the structure of the circuit for implementing the proposed interceptor to be used in major input–output devices and cryptographic modules, mounting a pathway designed on the basis of the construction method onto each device. Moreover, it is shown that it is possible to forcefully cause information leakage through electromagnetic waves. To detect the aforementioned threat, the paper also focuses on the changes in a device itself and the surrounding electromagnetic environment as a result of mounting an interceptor and considers a method of detecting an interceptor by both passive and active monitoring methods.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here