Presentation | 2016-11-08 [Invited Talk] Threat of Electromagnetic Information Leakage and Countermeasures Yu-ichi Hayashi, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | As our information society has further developed, the widespread use of personal electronic devices like smartphones and tablets as informational terminals has become universal. A necessity for this type of social system to be sufficiently functional involves ensuring information security through the protection of personal privacy and reliable and secure e-commerce. Information terminals are composed of a plurality of hierarchies, and to ensure security, implementation must be conducted vertically from the application layer down to the physical layer. Because individual layers generally operate by relying on the layers underneath them, a vulnerability in the hardware, which is the portion underlying the information system, can severely weaken security. Thus, ensuring hardware security is critical. Hardware vulnerabilities that can be exploited to circumvent security can be broadly divided into the categories of those that come from when electromagnetic information is generated through information processing inside a device, those caused through the application of devices that intentionally cause electromagnetic disturbances, and those that are the result of the system being reconfigured through deliberate modification of the electrical and electronic circuitry. In this talk, we focus on information security with regard to electromagnetic information leakage as it relates to hardware security (electromagnetic information security), and our subject device is tablet terminals with which the presence of a threat will be made apparent by using electromagnetic waves to steal on the display (EM display stealing). We will also consider, with regard to these tablets, methods and mechanisms for remedying this threat of having a display screen image being stolen electromagnetically. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | EM Information Leakage / Hardware Security |
Paper # | ISEC2016-63,SITE2016-53,LOIS2016-41 |
Date of Issue | 2016-10-31 (ISEC, SITE, LOIS) |
Conference Information | |
Committee | ISEC / LOIS / SITE |
---|---|
Conference Date | 2016/11/7(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Community Hall & AOSSA Mall, Fukui |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | Masahiro Mambo(Kanazawa Univ.) / Hiroyuki Nishi(Sojo Univ.) / Hitoshi Okada(NII) |
Vice Chair | Kazuto Ogawa(NHK) / Atsushi Fujioka(Kanagawa Univ.) / Tomohiro Yamada(NTT) / Tetsuya Morizumi(Kanagawa Univ.) / Masaru Ogawa(Kobe Gakuin Univ.) |
Secretary | Kazuto Ogawa(Toshiba) / Atsushi Fujioka(Tohoku Univ.) / Tomohiro Yamada(NTT) / Tetsuya Morizumi(Nagasaki Univ.) / Masaru Ogawa(Kyushu Univ.) |
Assistant | Toshihiro Ohigashi(Tokai Univ.) / Yuuji Suga(IIJ) / Atsuo Inomata(Tokyo Denki Univ.) / Yukihiro Nakamura(NTT) / Kanako Kawaguchi(Tokyo Univ. of the Arts) |
Paper Information | |
Registration To | Technical Committee on Information Security / Technical Committee on Life Intelligence and Office Information Systems / Technical Committee on Social Implications of Technology and Information Ethics |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | [Invited Talk] Threat of Electromagnetic Information Leakage and Countermeasures |
Sub Title (in English) | |
Keyword(1) | EM Information Leakage |
Keyword(2) | Hardware Security |
1st Author's Name | Yu-ichi Hayashi |
1st Author's Affiliation | Tohoku Gakuin University(Tohoku Gakuin Univ.) |
Date | 2016-11-08 |
Paper # | ISEC2016-63,SITE2016-53,LOIS2016-41 |
Volume (vol) | vol.116 |
Number (no) | ISEC-289,SITE-290,LOIS-291 |
Page | pp.pp.75-75(ISEC), pp.75-75(SITE), pp.75-75(LOIS), |
#Pages | 1 |
Date of Issue | 2016-10-31 (ISEC, SITE, LOIS) |