On the evaluation of electromagnetic information leakage from mobile device screens

Ville Yli-Mäyry, Daisuke Miyata, Naofumi Homma, Takafumi Aoki, Yu-Ichi Hayashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We present a statistical testing based methodology for evaluating electromagnetic radiation from a tested mobile device that potentially contains exploitable information for re-constructing screen images of the device. The basic idea is to employ a statistical test instead of reconstructing screen images. The validity of our methodology is demonstrated in a real-world setting by an experiment observing EM radiation from a tablet device's screen that would be usable in a TEMPEST attack.

Original languageEnglish
Title of host publication2018 IEEE International Symposium on Electromagnetic Compatibility and 2018 IEEE Asia-Pacific Symposium on Electromagnetic Compatibility, EMC/APEMC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1050-1052
Number of pages3
ISBN (Electronic)9781509059973
DOIs
Publication statusPublished - 2018 Jun 22
Event60th IEEE International Symposium on Electromagnetic Compatibility and 9th IEEE Asia-Pacific Symposium on Electromagnetic Compatibility, EMC/APEMC 2018 - Suntec City, Singapore
Duration: 2018 May 142018 May 18

Publication series

Name2018 IEEE International Symposium on Electromagnetic Compatibility and 2018 IEEE Asia-Pacific Symposium on Electromagnetic Compatibility, EMC/APEMC 2018

Other

Other60th IEEE International Symposium on Electromagnetic Compatibility and 9th IEEE Asia-Pacific Symposium on Electromagnetic Compatibility, EMC/APEMC 2018
CountrySingapore
CitySuntec City
Period18/5/1418/5/18

Keywords

  • Information leakage
  • Side-channel analysis
  • Statistical test
  • TEMPEST

ASJC Scopus subject areas

  • Aerospace Engineering
  • Electrical and Electronic Engineering
  • Safety, Risk, Reliability and Quality
  • Radiation

Fingerprint Dive into the research topics of 'On the evaluation of electromagnetic information leakage from mobile device screens'. Together they form a unique fingerprint.

Cite this