用于检测电子计算机设备有害电磁辐射的新信息技术

Yury Katkov
{"title":"用于检测电子计算机设备有害电磁辐射的新信息技术","authors":"Yury Katkov","doi":"10.31673/2518-7678.2020.042533","DOIUrl":null,"url":null,"abstract":"The article deals with the problem of TEMPEST - unintentional radiation of electronic equipment, which can be intercepted by malefactors in the form of radiation of an electromagnetic parasitic wave, and which, from a security point of view, is compromising radiation because they can have compromising information. Today, the term TEMPEST is the name of a technology that includes various methods of analyzing electromagnetic compromising radiation in such a way that they can be used to recover intercepted data. The task was completed: It is known that electronic equipment creates electromagnetic fields that can interfere with radio and television reception at a considerable distance. But interference is not the only problem caused by stray electromagnetic radiation. In some cases, you can get information about the signals that are used inside the equipment, when the radiation signals are intercepted by intruders and these signals are decoded. This capability poses a problem, especially in the case of digital equipment, since remote signal recovery within the equipment can allow the reconstruction of the data that the equipment is processing. Therefore, the problem arises of determining technologies for detecting spurious electromagnetic radiation from electronic computers, which may have compromising information. The content of TEMPEST-technology is considered as a physical phenomenon of capturing and recovery of electromagnetic radiation emitted by digital equipment, and which can have compromising information. TEMPEST hardware analysis is performed, which includes various types of sensitive receivers that can monitor a wide range of frequencies, as well as a combination of hardware and software capable of processing the received signals. The analysis of various types of TEMPEST-technology is carried out, namely: Tempest-attack, Soft TEMPEST, as well as a variety of technologies for intercepting information by receiving spurious radiation of a monitor signal, searching for the necessary information on a disk, outputting information to an unused serial port; reflections of the luminous flux from the monitor screen on the walls; modeling the luminous flux in LED indicators and others. Recommendations for protection against TEMPEST technologies for companies and individuals are given.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"New information technologies for detecting adverse compromising electromagnetic radiations from electronic computer equipment\",\"authors\":\"Yury Katkov\",\"doi\":\"10.31673/2518-7678.2020.042533\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article deals with the problem of TEMPEST - unintentional radiation of electronic equipment, which can be intercepted by malefactors in the form of radiation of an electromagnetic parasitic wave, and which, from a security point of view, is compromising radiation because they can have compromising information. Today, the term TEMPEST is the name of a technology that includes various methods of analyzing electromagnetic compromising radiation in such a way that they can be used to recover intercepted data. The task was completed: It is known that electronic equipment creates electromagnetic fields that can interfere with radio and television reception at a considerable distance. But interference is not the only problem caused by stray electromagnetic radiation. In some cases, you can get information about the signals that are used inside the equipment, when the radiation signals are intercepted by intruders and these signals are decoded. This capability poses a problem, especially in the case of digital equipment, since remote signal recovery within the equipment can allow the reconstruction of the data that the equipment is processing. Therefore, the problem arises of determining technologies for detecting spurious electromagnetic radiation from electronic computers, which may have compromising information. The content of TEMPEST-technology is considered as a physical phenomenon of capturing and recovery of electromagnetic radiation emitted by digital equipment, and which can have compromising information. TEMPEST hardware analysis is performed, which includes various types of sensitive receivers that can monitor a wide range of frequencies, as well as a combination of hardware and software capable of processing the received signals. The analysis of various types of TEMPEST-technology is carried out, namely: Tempest-attack, Soft TEMPEST, as well as a variety of technologies for intercepting information by receiving spurious radiation of a monitor signal, searching for the necessary information on a disk, outputting information to an unused serial port; reflections of the luminous flux from the monitor screen on the walls; modeling the luminous flux in LED indicators and others. Recommendations for protection against TEMPEST technologies for companies and individuals are given.\",\"PeriodicalId\":171656,\"journal\":{\"name\":\"Scientific Notes of the State University of Telecommunications\",\"volume\":\"99 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scientific Notes of the State University of Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2518-7678.2020.042533\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific Notes of the State University of Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2518-7678.2020.042533","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文讨论了TEMPEST问题——电子设备的无意辐射,它可以被不法分子以电磁寄生波辐射的形式截获,从安全的角度来看,这是一种危害辐射,因为他们可能拥有危害信息。今天,术语TEMPEST是一种技术的名称,它包括各种分析电磁危害辐射的方法,这些方法可以用来恢复被截获的数据。任务完成了:众所周知,电子设备产生的电磁场可以在相当远的地方干扰无线电和电视的接收。但是干扰并不是由杂散电磁辐射引起的唯一问题。在某些情况下,当辐射信号被入侵者拦截并解码时,你可以获得有关设备内部使用的信号的信息。这种能力带来了一个问题,特别是在数字设备的情况下,因为设备内部的远程信号恢复可以允许设备正在处理的数据的重建。因此,确定检测来自电子计算机的虚假电磁辐射的技术就出现了问题,因为电子计算机可能含有有害的信息。tempest技术的内容被认为是捕获和恢复数字设备发出的电磁辐射的物理现象,并且可能具有折衷信息。执行TEMPEST硬件分析,其中包括各种类型的敏感接收器,可以监测广泛的频率范围,以及能够处理接收信号的硬件和软件的组合。分析了各种类型的TEMPEST技术,即:TEMPEST攻击、Soft TEMPEST,以及通过接收监测信号的虚辐射、在磁盘上搜索所需信息、将信息输出到未使用的串口等方式截获信息的各种技术;显示器屏幕上光通量在墙上的反射;模拟LED指示灯等的光通量。对公司和个人提出了防范TEMPEST技术的建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
New information technologies for detecting adverse compromising electromagnetic radiations from electronic computer equipment
The article deals with the problem of TEMPEST - unintentional radiation of electronic equipment, which can be intercepted by malefactors in the form of radiation of an electromagnetic parasitic wave, and which, from a security point of view, is compromising radiation because they can have compromising information. Today, the term TEMPEST is the name of a technology that includes various methods of analyzing electromagnetic compromising radiation in such a way that they can be used to recover intercepted data. The task was completed: It is known that electronic equipment creates electromagnetic fields that can interfere with radio and television reception at a considerable distance. But interference is not the only problem caused by stray electromagnetic radiation. In some cases, you can get information about the signals that are used inside the equipment, when the radiation signals are intercepted by intruders and these signals are decoded. This capability poses a problem, especially in the case of digital equipment, since remote signal recovery within the equipment can allow the reconstruction of the data that the equipment is processing. Therefore, the problem arises of determining technologies for detecting spurious electromagnetic radiation from electronic computers, which may have compromising information. The content of TEMPEST-technology is considered as a physical phenomenon of capturing and recovery of electromagnetic radiation emitted by digital equipment, and which can have compromising information. TEMPEST hardware analysis is performed, which includes various types of sensitive receivers that can monitor a wide range of frequencies, as well as a combination of hardware and software capable of processing the received signals. The analysis of various types of TEMPEST-technology is carried out, namely: Tempest-attack, Soft TEMPEST, as well as a variety of technologies for intercepting information by receiving spurious radiation of a monitor signal, searching for the necessary information on a disk, outputting information to an unused serial port; reflections of the luminous flux from the monitor screen on the walls; modeling the luminous flux in LED indicators and others. Recommendations for protection against TEMPEST technologies for companies and individuals are given.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信