EXPERIMENTS ON ELECTROMAGNETIC LEAKAGE FROM LAPTOP COMPUTERS

dc.contributor.advisorBarnes, Ronald
dc.contributor.authorBorowska, Lesya
dc.contributor.committeeMemberHavlicek, Joseph
dc.contributor.committeeMemberPalmer, Robert
dc.contributor.committeeMemberZhang, Guifu
dc.contributor.committeeMemberZrnic, Dusan
dc.date.accessioned2017-05-15T14:21:28Z
dc.date.available2017-05-15T14:21:28Z
dc.date.issued2017-05-12
dc.date.manuscript2017-05-04
dc.description.abstractThe possibility of an electromagnetic (EM) side channel attack on computers has been known since 1967. Each executed instruction/event from running a program on a computer/laptop causes an EM signal at particular frequency. Based on this signal, theoretically, it can be established what is happening on the computer/laptop. In practice, no one has used EM leakage to decode instructions in detail or extract full information from memories if computers work internally without exchanging information with the outside world, e.g., through the Internet, etc. The main focus of this research is determination of the EM leakage from a modern laptop. Three main experimental components that help to detect the leakage are addressed: a spectrum analyzer (SA), a tracking generator, and "victim" laptop (the one which leakage is measured). All of the research on the EM side channel attack used EM far-field probes. EM near-field probes have been applied to this EM leakage for the first time. Studying the characteristics of the leakage spectra from a laptop could lead to new protection techniques and improvements for laptop-safe instruction executions. EM data were collected in varying frequency bands, environment conditions, and running programs. A cache hit/miss program was chosen for testing the possibility of the EM leakage because of the highest radiation level compared with other instructions. The program was written in such a way that allows to specify and change the program’s frequency. This frequency was successfully detected in this study.en_US
dc.identifier.urihttp://hdl.handle.net/11244/50857
dc.languageen_USen_US
dc.subjectElectromagnetic emanation security
dc.subjectElectromagnetic information leakage
dc.subjectSecurity of modern processors
dc.subjectSide-channel attack
dc.subjectCovert-channel attack
dc.thesis.degreeMaster of Scienceen_US
dc.titleEXPERIMENTS ON ELECTROMAGNETIC LEAKAGE FROM LAPTOP COMPUTERSen_US
ou.groupCollege of Engineering::School of Electrical and Computer Engineeringen_US
shareok.nativefileaccessrestricteden_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2017_Borowska_Lesya_Thesis.pdf
Size:
4.82 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.72 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections