The Search and Reconstruction of Compromising Emanations of Laser Printers in Three Media
نویسندگان
چکیده
In this paper, the emissions of a laser printer, which may process classified information, are investigated in the media of electromagnetic radiation (ER), Power Line Conductors (PLC), and Signal Line Conductors (SLC). First, the candidate frequency points of Compromising Emanations (CE) are examined in the frequency domain. Second, the emitted signal is AM-demodulated with the proper bandwidth, and then sampled by a high storage oscilloscope in these frequency points. Third, the collected data is converted to 2D image by applying signal and image processing techniques. In addition, this study introduces some practical measurement methods to reveal the possible CEs of laser printers. Finally, the procedure of the image reconstruction of CEs of the laser printer data is explained in detail. KeywordsCompromising Emanations; Information Leakages; Printers; TEMPEST; Electromagnetic Radiation; Power and Signal Line Conductors.
منابع مشابه
کاربرد چاپگر سهبعدی در بازسازی اشیای تاریخی شیشهای
Three-dimensional tools are widely used for various purposes, particularly Three- dimensional printers which play a great role in simplification and acceleration of phases in production process for various fields ranging from medicine to industry. Due to the problems related to the reconstruction of missing parts in restoration of historic glass objects in the methods of molding, casting and f...
متن کاملAnalysis of Information Leakages on Laser Printers in the Media of Electromagnetic Radiation and Line Conductions
In this paper, the emissions of a laser printer, which may process classified information, are investigated in the media of electromagnetic radiation (ER), Power Line Conductors (PLC), and Signal Line Conductors (SLC). First, the candidate frequency points of CE are examined in the frequency domain. Second, the emitted signal is AM-demodulated with the proper bandwidth, and then sampled by a hi...
متن کاملSide Channels, Compromising Emanations and Surveillance: Current and future technologies
Side channel attacks exploit implementation-specific information leakage to defeat cryptographic measures, usually designed to provide confidentiality. The majority of published attacks require physical possession or network access to the target device, and as such are not suitable for implementation by an attacker wishing to carry out a remote, passive and undetectable attack. Surveillance tec...
متن کاملCompromising Electromagnetic Emanations of Wired and Wireless Keyboards
Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards eventually emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. The technique generally used to detect compromising emanations is based on a wide-band receiver, tuned on a specific frequency. However, this method ma...
متن کاملA Review of the Recent Advances and Application of 3D Printing in Pharmacy and Drug Delivery
Throughout human history, the most valuable inventions have been those that, even decades after their initial introduction, affected the lives of people around the world. 3D printers similar to steam engines, light bulbs, and the World Wide Web are thought to be among the inventions that will revolutionize the future of different industries. This technology is generally introduced as the manuf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015