Understanding screaming channels: From a detailed analysis to improved attacks

G Camurati, A Francillon, FX Standaert - IACR transactions on …, 2020 - hal.science
Recently, some wireless devices have been found vulnerable to a novel class of side-
channel attacks, called Screaming Channels. These leaks might appear if the sensitive …

Noise-sdr: Arbitrary modulation of electromagnetic noise from unprivileged software and its impact on emission security

G Camurati, A Francillon - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
Electronic devices generate electromagnetic noise, also known as EM leakage when the
noise leaks information. Many recent research papers exploit the fact that software activity …

SoK: A Security Architect's View of Printed Circuit Board Attacks

J Harrison, N Jessurun, M Tehranipoor - arxiv preprint arxiv:2410.09993, 2024 - arxiv.org
Many recent papers have proposed novel electrical measurements or physical inspection
technologies for defending printed circuit boards (PCBs) and printed circuit board …

Combating Adversarial Covert Channels in Wi-Fi Networks

H Park, W Jang, J Sung, H Roh, W Lee - IEEE Access, 2022 - ieeexplore.ieee.org
Physical layer covert channels exploit the characteristics of radio signals to convey secret
messages while remaining inconspicuous within wireless channels. With specifically …

Models for System-Level and Detection-Based Printed Circuit Board Attacks and Countermeasures

J Harrison - 2024 - search.proquest.com
To secure PCB assemblies, methods for detecting counterfeit components, malicious
modifications, and in-field tampering have been proposed. However, concerning trends …

Electromagnetic security for information systems: statistical assessment of couplings in reverberant environments

V Houchouas - 2020 - theses.hal.science
The electromagnetic security (EMSEC) can be defined as the merging of the
electromagnetic compatibility~(EMC) and the information security. To guarantee the EMSEC …

Electromagnetic security: threat models and exploitation scenarios exploiting susceptibility to HPEM

This chapter discusses the existing relationship between electromagnetic compatibility
(EMC) and information security (infosec) and provides an introduction to electromagnetic …

Applications of the Random Coupling Model to Assess Induced Currents or Voltages in Reverberant Environment

V Houchouas, M Darces, M Hélier, E Cottais… - Progress In …, 2020 - jpier.org
Coupling in electronic devices may be a threat for the security of the information they
process. Indeed, a current flowing into a conductor may radiate an electromagnetic field that …