Ciber Ataques Baseados em Efeitos Eletromagnéticos
(Cyber-Attacks Based in Electromagnetic Effects)
Marcelo Bender Perotoni (email@example.com)1, Roberto Menna Barreto2, Stilante Koch Manfrin1
1Universidade Federal do ABC2QEMC Consulting
This paper appears in: Revista IEEE América Latina
Publication Date: June 2016
Volume: 14, Issue: 6
This article covers eavesdropping on computer and auxiliary data communication equipment by means of hardware, namely unintended electromagnetic emanations. The physical basis that underlies the process is covered, alongside with a canonical electromagnetic simulation. Some known cases of these exploits are covered, and real world examples of a leaking coaxial cable and a shielding conductive sheet are measured in the laboratory, with results relate to the data protection and its implications. The measured shielding effectiveness of the sheet proved to comply with usual Tempest requirements.
Shielding, Electromagnetic Compatibility (EMC), Information Security
Documents that cite this
This function is not implemented yet.
[PDF Full-Text (640)]