Receipt date: 
20.01.2020
Year: 
2020
Journal number: 
УДК: 
004.056.52
DOI: 

DOI: 10.26731/2658-3704.2020.1(6).52-63

Article File: 
Pages: 
52
63
Abstract: 

This paper is a review about current problems in the field of Transient Electromagnetic Pulse Emanations Standard (TEMPEST). TEMPEST research statistics of Russian and foreign investigators over recent years are summarized.

The subject of future researching are selected in light of this.

TEMPEST issue classification is available.

Main TEMPEST researching problems from non-cofidential papers are highlighted: videointerface emanations intercepting; soft-TEMPEST intercepting; delay TEMPEST signal analysis; encryption keys TEMPEST intercepting; TEMPEST information security methods; passive TEMPEST information security methods.

Textbooks for information security universities review are done.

Paper also contains review of PhD degree dissertations abstracts apply to TEMPEST information security methods.

Passive TEMPEST information security efficiency estimation method engineering and hardware and software system are selected as the subject of future researching in in the end.

List of references: 
  1. Van Eck W. Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk Text//Computers and Security. — 1985. — №4. — P. 269-286.
  2. Sizov V.Y. Early TEMPEST researches and history generalization//Regional Informatics SPOISU. — 2018. — P. 280-282.
  3. Kuhn M. Compromising Emanations: Eavesdropping Risks of Computer Displays//University of Cambridge Computer Laboratory. Technical Report. — 2003. — №577. 177 P.
  4. Elibol F., Sarac U., Erer I. Realistic Eavedropping Attack on Computer Displays with Low-Cost and Mobile Reciever System//20th European Signal Processing Conference. — 2012 — P. 1767-1771.
  5. Kuhn M. Soft Tempest Hidden Data Transmission Using Electromagnetic Emanations//Springer-Verlag Berlin Heidelberg. — 1998. — P. 124-141.
  6. Kuhn M. Composing emanations of LCD TV sets// IEEE International Symposium on Electromagnetic Compability.  — P. 931-936.
  7. Kuhn M. Electromagnetic Eavesdropping Risks of Flat-Panel Displays//4th Workshop on Privacy Enhancing Technologies. — 2004. — P. 1-18.
  8. Batalov A.S. Investigation of videosystem TEMPEST with LVDS interface//Radioelectronic Devices and Systems for Infocommunication Technologies. Information Security. — 2015. — P. 404-407.
  9. Zhou C., Yu Q., Wang L. Investigation of the Risk of Electromagnetic Security on Computer Systems//International Journal of Computer and Electrical Engineering. — 2012. — T.4. — №1. — P. 93-98.
  10. Krylova S.L. Research of videosystem TEMPEST in the university information security laboratory //Сollection of Scientific Papers  Nauchny Mir Ltd.. —  2014. — Т.18. —№2. — P. 80-85.
  11. Horev А.А. Mathematical model for detecting the TEMPEST of a computer videosystem by an optimal receiver //Information Security Issues , 2014. — №1(104). — P. 65-71.
  12. Horev А.А. Evaluation of the possibility of TEMPEST detection//TUSUR Reports. 2014. — №2(32).  — P. 207-213.
  13. Vasechkin Е.А., Taranov А.B. TEMPEST signal model of videointerfaces//SPIIRAN Works. 2016. — №4(47). — P. 46-64.
  14. Egin А.V., Levin D.V., Parshutkin А.V. Generalized mathematical model of the effect of active interference on the technical means of TEMPEST intercepting from raster information display systems //Proceedings of the Mozhaysky Military Space Academy.  — 2016. — №651. — P. 62-70.
  15. Zheleznov D.I., Mischenko D.А. Information leakage security through TEMPEST from computer videosystems//Scientific and practical electronic journal Science Alley . — 2017. — №10. — P. 62-70.
  16. Parshutkin А.V., Egin А.V., Voznuk V.V., Levin D.V. Application of active noise suppression system TEMPEST when transmitting data according to DVI standard //University Journal Priborostroenie. —  2017. —  Т. 60. —  №1. — P. 25-31.
  17. Ryabinin А.М. Information transmission via channel based by the soft TEMPEST technology //Radioelectronic Devices and Systems for Infocommunication Technologies. Information Security. — 2015. — P. 436-439.
  18. Ryabinin А.М., Filatov V.I., Belkov I.V. Model of a channel for transmitting information via software-controlled TEMPEST //Telecommunication and Transport. —  2016. —  Том 10. — №1. —   P. 77-80.
  19. Antyasov I.S., Safonov А.V., Sokolov А.N. Software and hardware implementation of soft TEMPEST technology //UrFO Messenger. Information Security . —  2015. — №3(17). — P. 8-11.
  20. Bonch-Bruevich А.М., Angenko А.А. The method of delayed analysis of TEMPEST signals in the tasks of assessing the security of telecommunication information//Radioelectronic Devices and Systems for Infocommunication Technologies. Information Security. —2015. — P. 402-404.
  21. Jun B., Kenworthy G. Is Your Device Radiating Keys//RSA Conference. — 2012.
  22. Genkin D., Pachmanov L., Pipman I., Tromer E. ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs//Proc. RSA Conference Cryptographers' Track. —2016. — P. 219-235.
  23. Maslovsky V.М. The method of guaranteed protection of information from leakage through TEMPEST channels: PhD degree dissertation: 05.13.19. Saint-Petersburg, 2003. — 107 с.
  24. Zaycev А.P., Mescheryakov R.V., Shelupanov А.А. Technical means and methods of information security. Textbook for Universities//Moscow: Goryachaya linia–Telecom, 2012. — P. 30-51.
  25. Titov А.А. Technical means of information security//Tomsk: TUSUR, 2010. — P. 166-191.
  26. Buzov G.А. Practical guidance on identifying special technical means of unauthorized obtaining information //Moscow: Goryachaya linia–Telecom, 2019. — P. 28-31.
  27.  Malyuk А.А. Information Security in the Information Society//Moscow: Goryachaya linia–Telecom, 2017. — P. 120-126.
  28. Skripnik D.А. General issues of technical information security //Moscow .: NOU «INTUIT», 2012. — P. 120-126.
  29. Zhigunova Y.А. Methodics and software for the searching informative harmonics of electromagnetic radiation signals from computer facilities: PhD degree dissertation: 05.13.01. Irkutsk, 2009. — 123 с.
  30. Urbanovich P.V. Methods and means of generating electromagnetic noise: PhD degree dissertation: 05.13.19. Tomsk, 2010. — 143 с.
  31. Petrov I.S. Localization and attenuation of TEMPEST from PC by shielding electromagnetic waves //JUGU Messenger. Computer technology, control, electronics Series. — 2012 г. — Vol.16. — №23(282). — P. 189–191.
  32. Lyubchenkov А.V. Analysis of methods for measuring the electrodynamic parameters of materials absorbing microwave electromagnetic radiation //Voronezh State University Messenger — 2009. —Т.5. — №9. — P.111-113.
  33. Ostapenko А.G., Lyubchenkov А.V., Naumenko Y.S. Evaluation of the effectiveness of the use of radar absorbing materials from leakage through the TEMPEST channel at informatization facilities//Information and Security. — 2011. — Т.14. — №1 — P. 113-116.
  34. Kolbun N.V., Petrov S.N., Prudnik А.М. Electromagnetic and acoustic characteristics of multilayer materials for integrated protection systems//BGUIR Reports. — 2009. —  №3(41). — P. 79-85.