| アイテムタイプ |
学術雑誌論文 / Journal Article(1) |
| 公開日 |
2026-02-25 |
| 日付 |
|
|
日付 |
2027-11-18 |
|
日付タイプ |
Available |
| タイトル |
|
|
タイトル |
Two-Stage Adaptive Data Recovery Method from Electromagnetic Emanations Using Error Detection Codes |
| 言語 |
|
|
言語 |
eng |
| キーワード |
|
|
主題Scheme |
Other |
|
主題 |
Electromagnetic information leakage |
| キーワード |
|
|
主題Scheme |
Other |
|
主題 |
Hardware security |
| キーワード |
|
|
主題Scheme |
Other |
|
主題 |
Protocol |
| 資源タイプ |
|
|
資源タイプ |
journal article |
| アクセス権 |
|
|
アクセス権 |
embargoed access |
| 著者 |
Abe, Koki
Kitazawa, Taiki
藤本, 大介
林, 優一
|
| 抄録 |
|
|
内容記述タイプ |
Abstract |
|
内容記述 |
This article presents a two-stage adaptive bit recovery method utilizing error detection codes for information recovery via electromagnetic emanations from encoded data transmission systems. Traditional TEMPEST primarily targets human interface devices where contextual information enables error correction; however, in encoded data, even single-bit errors can propagate through the decoding process, rendering entire information blocks irrecoverable. In the first stage, our proposed method performs exhaustive threshold searching utilizing packet-embedded error detection codes to achieve complete recovery of packets transmitted under favorable electromagnetic environments. In the second stage, statistical amplitude distribution profiles constructed from successfully recovered packets are used to identify error candidate bits in packets transmitted under degraded environments, enabling error correction through limited combinatorial searches. Experimental validation using a USB 2.0 webcam demonstrated successful complete recovery of Motion JPEG-encoded 640 × 480 resolution images (59 packets/frame), proving the feasibility of encoded data recovery under time-varying electromagnetic environments. The objective of this study is to conservatively quantify—from an adversary's standpoint—the amount of information that can be recovered via electromagnetic leakage, and to feed the result back to EMC/security engineers as a design-time risk-assessment guideline. |
| 書誌情報 |
en : IEEE Transaction on Electromagnetic Compatibility
巻 68,
号 1,
p. 13-20,
ページ数 8,
発行日 2025-11-18
|
| 出版者 |
|
|
出版者 |
IEEE |
| ISSN |
|
|
収録物識別子タイプ |
EISSN |
|
収録物識別子 |
1558-187X |
| 出版者版DOI |
|
|
関連タイプ |
isVersionOf |
|
|
識別子タイプ |
DOI |
|
|
関連識別子 |
https://doi.org/10.1109/TEMC.2025.3631109 |
| 出版者版URI |
|
|
関連タイプ |
isVersionOf |
|
|
識別子タイプ |
URI |
|
|
関連識別子 |
https://ieeexplore.ieee.org/document/11251479 |
| 権利 |
|
|
権利情報 |
© 2026 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. 出版社許諾条件により、本文は2027年11月18日以降に公開 |
| 著者版フラグ |
|
|
出版タイプ |
AM |
| 助成情報 |
|
|
|
助成機関名 |
Japan Science and Technology Agency (JST) |
|
|
研究課題番号 |
JPMJKP24C1 |
|
|
研究課題番号URI |
https://projectdb.jst.go.jp/grant/JST-PROJECT-24017617/ |
|
|
研究課題名 |
AIハードウェアセキュリティ基盤技術の開発 |
| 助成情報 |
|
|
|
助成機関名 |
Japan Science and Technology Agency (JST) |
|
|
研究課題番号 |
JPMJFR206L |
|
|
研究課題番号URI |
https://projectdb.jst.go.jp/grant/JST-PROJECT-20352660/ |
|
|
研究課題名 |
物理法則上回避不可能なハードウェアセキュリティ対策手法の開拓 |
| 助成情報 |
|
|
|
助成機関名 |
Japan Society for the Promotion of Science (JSPS) |
|
|
研究課題番号 |
JP23KJ1593 |
|
|
研究課題番号URI |
https://kaken.nii.ac.jp/grant/KAKENHI-PROJECT-23KJ1593/ |
|
|
研究課題名 |
デジタルツインを用いた電磁的情報漏えいハザードマップの開拓 |