Citation: | Liu Wenbin, Ding Jianfeng, Kou Yunfeng, et al. Research on electromagnetic vulnerability of air-gapped network[J]. High Power Laser and Particle Beams, 2019, 31: 103215. doi: 10.11884/HPLPB201931.190132 |
[1] |
Ramsay C. TEMPEST attacks against AES[EB/OL]. https://www.fox-it.com/en/insights/blogs/blog/tempest-attacks-aes/.
|
[2] |
Genkin D, Pachmanov L, Pipman I, et al. Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation[C]//The WorkShop on Cryptographic Hardware and Embedded Systems(CHES)2015 in September 2015.
|
[3] |
Carrara B. Air-gap covert channels[EB/OL]. https://ruor.uottawa.ca/bitstream/10393/35103/1/Carrara_Brent_2016_thesis.pdf.
|
[4] |
Guri M, Zadov B, Bykhovsky D, et al. PowerHammer: Exfiltrating data from air-gapped computers through power lines[EB/OL]. https://airxiv.org/pdf/1804.04014.pdf.
|
[5] |
Cui A. Funtenna[EB/OL]. https://www.funtenna.org/CuiBH2015.pdf.
|
[6] |
Entriken W. System bus radio[EB/OL]. https://github.com/fulldecent/system-bus-radio.
|
[7] |
David A, George L. Exfiltrating reconnaissance data from air-gapped ICS/SCADA netowrks[EB/OL]. http://www.blackhat.com/eu-17/briefings.html.
|
[8] |
Teitler L. Let's play NSA! The hackers open-sourcing top secret spy tools[EB/OL]. http://motherboard.vice.com/en_us/aritcle/bmjpj3/michael-ossmann-and-the-nsa-playset.
|
[9] |
刘文斌, 丁建锋, 寇云峰, 等. 软件定义电磁泄漏技术与应用分析[J]. 通信技术, 2017, 50(9): 2094-2099. https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201709035.htm
Liu Wenbin, Ding Jianfeng, Kou Yunfeng, et al. Software-defined electromagnetic leakage technology and its application. Communications Technology, 2017, 50(9): 2094-2099 https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201709035.htm
|
[10] |
丁建锋, 刘文斌, 丁磊, 等. 基于主动检测的电子设备电磁信息泄漏新型威胁分析[J]. 通信技术, 2018, 51(4): 936-940. https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201804035.htm
Ding Jianfeng, Liu Wenbin, Ding Lei, et al. New threat analysis of electromagnetic information leakage in electronic equipment based on active detection. Communications Technology, 2018, 51(4): 936-940 https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201804035.htm
|
[11] |
程磊, 罗儒俊, 寇云峰, 等. 基于电源线的传导电磁信息泄漏模型与验证[J]. 通信技术, 2018, 51(4): 941-946. https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201804036.htm
Cheng Lei, Luo Rujun, Kou Yunfeng, et al. Verification of conductive electromagnetic information leakage model based on power line. Communications Technology, 2018, 51(4): 941-946 https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201804036.htm
|
[12] |
丁建锋, 刘文斌, 廖翔宇, 等. 基于电子设备电磁敏感特性的信息注入模型与验证[J]. 通信技术, 2017, 50(11): 2589-2593. https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201711034.htm
Ding Jianfeng, Liu Wenbin, Liao Xiangyu, et al. Verification of information-injection model based on electromagnetic susceptibility characteristic of electronic equipment. Communications Technology, 2017, 50(11): 2589-2593 https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201711034.htm
|
[13] |
齐国雷, 寇云峰, 胡浩, 等. 基于隐蔽声通道的物理隔离计算机信息泄漏研究[J]. 通信技术, 2018, 51(3): 700-704. https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201803036.htm
Qi Guolei, Kou Yunfeng, Hu Hao, et al. Information leakage based on acoustic convert channel for air-gapped computers. Communications Technology, 2018, 51(3): 700-704 https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201803036.htm
|
[14] |
胡浩, 罗儒俊, 齐国雷, 等. 基于LED显示屏的隐蔽光传输通道[J]. 通信技术, 2018, 51(7): 1689-1693. https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201807032.htm
Hu Hao, Luo Rujun, Qi Guolei, et al. Covert-optical transmission channel based on LED display. Communications Technology, 2018, 51(7): 1689-1693 https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201807032.htm
|
[15] |
张琪, 刘文斌, 丁建锋, 等. 基于隐蔽光通道的物理隔离网络信息注入新型威胁分析[J]. 通信技术, 2018, 51(12): 2960-2964. https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201812029.htm
Zhang Qi, Liu Wenbin, Ding Jianfeng, et al. New threat analysis of information injection in air-gapped network based on light covert channel. Communications Technology, 2018, 51(12): 2094-2099 https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201812029.htm
|
[16] |
张琪, 刘文斌, 丁建锋, 等. 基于建立隐蔽热通道桥接物理隔离网络的新型威胁分析[J]. 通信技术, 2019, 52(1): 173-178. https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201901031.htm
Zhang Qi, Liu Wenbin, Ding Jianfeng, et al. New threat analysis based on hot covert channel to bridge air-gapped network. Communications Technology, 2019, 52(1): 173-178 https://www.cnki.com.cn/Article/CJFDTOTAL-TXJS201901031.htm
|
[17] |
饶志宏, 方恩博. 软件与系统漏洞分析与发现技术研究构想和成果展望[J]. 工程科学与技术, 2018, 50(1): 9-21. https://www.cnki.com.cn/Article/CJFDTOTAL-SCLH201801002.htm
Rao Zhihong, Fang Enbo. Research plan and achievements prospects for the analysis and discovery technology of vulnerabilities in software and system. Advanced Engineering Sciences, 2018, 50(1): 9-21 https://www.cnki.com.cn/Article/CJFDTOTAL-SCLH201801002.htm
|