Citation: | Kou Yunfeng, Dai Fei, Zhao Zhiguo, et al. Leakage signal classification and recognition method based on fusion features[J]. High Power Laser and Particle Beams, 2024, 36: 043018. doi: 10.11884/HPLPB202436.230186 |
[1] |
刘文斌, 丁建锋, 寇云峰, 等. 物理隔离网络电磁漏洞研究[J]. 强激光与粒子束, 2019, 31:103215 doi: 10.11884/HPLPB201931.190132
Liu Wenbin, Ding Jianfeng, Kou Yunfeng, et al. Research on electromagnetic vulnerability of air-gapped network[J]. High Power Laser and Particle Beams, 2019, 31: 103215 doi: 10.11884/HPLPB201931.190132
|
[2] |
刘文斌, 王梦寒, 寇云峰, 等. 基于电磁泄漏信号的电子设备行为识别与安全应用[J]. 通信技术, 2019, 52(7):1761-1765 doi: 10.3969/j.issn.1002-0802.2019.07.038
Liu Wenbin, Wang Menghan, Kou Yunfeng, et al. Behavior recognition and security application of electronic equipment based on electromagnetic leakage signal[J]. Communications Technology, 2019, 52(7): 1761-1765 doi: 10.3969/j.issn.1002-0802.2019.07.038
|
[3] |
刘文斌, 丁建锋, 寇云峰, 等. 软件定义电磁泄漏技术与应用分析[J]. 通信技术, 2017, 50(9):2094-2099 doi: 10.3969/j.issn.1002-0802.2017.09.035
Liu Wenbin, Ding Jianfeng, Kou Yunfeng, et al. Software-defined electromagnetic leakage technology and its application[J]. Communications Technology, 2017, 50(9): 2094-2099 doi: 10.3969/j.issn.1002-0802.2017.09.035
|
[4] |
王梦寒, 寇云峰, 刘文斌, 等. 计算机网络电磁泄漏信号的实时监测与智能识别[J]. 通信技术, 2019, 52(7):1755-1760 doi: 10.3969/j.issn.1002-0802.2019.07.037
Wang Menghan, Kou Yunfeng, Liu Wenbin, et al. Real-time monitoring and intelligent recognition of electromagnetic leakage signals in computer networks[J]. Communications Technology, 2019, 52(7): 1755-1760 doi: 10.3969/j.issn.1002-0802.2019.07.037
|
[5] |
关天敏, 韩振中, 茅剑. 显示器电磁信息泄漏的机器学习检测方法研究[J]. 信息安全学报, 2021, 6(2):101-109 doi: 10.19363/J.cnki.cn10-1380/tn.2021.03.07
Guan Tianmin, Han Zhenzhong, Mao Jian. Research on the detection method of electromagnetic information leakage from display by machine learning[J]. Journal of Cyber Security, 2021, 6(2): 101-109 doi: 10.19363/J.cnki.cn10-1380/tn.2021.03.07
|
[6] |
徐艳云, 张萌, 黄伟庆. 信息设备电磁辐射信息泄漏的可检测距离估计方法研究[J]. 信息安全学报, 2020, 5(1):44-56 doi: 10.19363/J.cnki.cn10-1380/tn.2020.01.05
Xu Yanyun, Zhang Meng, Huang Weiqing. Study on detectable distance for electromagnetic information leakage of information equipment[J]. Journal of Cyber Security, 2020, 5(1): 44-56 doi: 10.19363/J.cnki.cn10-1380/tn.2020.01.05
|
[7] |
Sehatbakhsh N, Nazari A, Alam M, et al. REMOTE: robust external malware detection framework by using electromagnetic signals[J]. IEEE Transactions on Computers, 2020, 69(3): 312-326. doi: 10.1109/TC.2019.2945767
|
[8] |
Werner F T, Yilmaz B B, Prvulovic M, et al. Leveraging EM side-channels for recognizing components on a motherboard[J]. IEEE Transactions on Electromagnetic Compatibility, 2021, 63(2): 502-515. doi: 10.1109/TEMC.2020.3016892
|
[9] |
Jorgensen E J, Werner F T, Prvulovic M, et al. Deep learning classification of motherboard components by leveraging EM side-channel signals[J]. Journal of Hardware and Systems Security, 2021, 5(2): 114-126. doi: 10.1007/s41635-021-00116-2
|
[10] |
丁建锋, 刘文斌, 丁磊, 等. 基于主动检测的电子设备电磁信息泄漏新型威胁分析[J]. 通信技术, 2018, 51(4):936-940 doi: 10.3969/j.issn.1002-0802.2018.04.035
Ding Jianfeng, Liu Wenbin, Ding Lei, et al. New threat analysis of electromagnetic information leakage in electronic equipment based on active detection[J]. Communications Technology, 2018, 51(4): 936-940 doi: 10.3969/j.issn.1002-0802.2018.04.035
|
[11] |
丁建锋, 刘文斌, 王梦寒, 等. 计算机声光电磁信号互调泄漏威胁分析[J]. 通信技术, 2019, 52(4):967-970 doi: 10.3969/j.issn.1002-0802.2019.04.034
Ding Jianfeng, Liu Wenbin, Wang Menghan, et al. Threat analysis of computer information leakage in intermodulation of acoustic, optical and electromagnetic signals[J]. Communications Technology, 2019, 52(4): 967-970 doi: 10.3969/j.issn.1002-0802.2019.04.034
|
[12] |
程磊, 罗儒俊, 寇云峰, 等. 基于电源线的传导电磁信息泄漏模型与验证[J]. 通信技术, 2018, 51(4):941-946 doi: 10.3969/j.issn.1002-0802.2018.04.036
Cheng Lei, Luo Rujun, Kou Yunfeng, et al. Verification of conductive electromagnetic information leakage model based on power line[J]. Communications Technology, 2018, 51(4): 941-946 doi: 10.3969/j.issn.1002-0802.2018.04.036
|
[13] |
齐国雷, 寇云峰, 胡浩, 等. 基于隐蔽声通道的物理隔离计算机信息泄漏研究[J]. 通信技术, 2018, 51(3):700-704 doi: 10.3969/j.issn.1002-0802.2018.03.036
Qi Guolei, Kou Yunfeng, Hu Hao, et al. Information leakage based on acoustic convert channel for air-gapped computers[J]. Communications Technology, 2018, 51(3): 700-704 doi: 10.3969/j.issn.1002-0802.2018.03.036
|
[14] |
胡浩, 罗儒俊, 齐国雷, 等. 基于LED显示屏的隐蔽光传输通道[J]. 通信技术, 2018, 51(7):1689-1693 doi: 10.3969/j.issn.1002-0802.2018.07.032
Hu Hao, Luo Rujun, Qi Guolei, et al. Covert-optical transmission channel based on LED display[J]. Communications Technology, 2018, 51(7): 1689-1693 doi: 10.3969/j.issn.1002-0802.2018.07.032
|
[15] |
Guri M, Zadov B, Bykhovsky D, et al. PowerHammer: Exfiltrating data from air-gapped computers through power lines[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 1879-1890. doi: 10.1109/TIFS.2019.2952257
|