IEMI threats for information security: Remote command injection on modern smartphones

C Kasmi, JL Esteves - IEEE Transactions on Electromagnetic …, 2015 - ieeexplore.ieee.org
Numerous papers dealing with the analysis of electromagnetic attacks against critical
electronic devices have been made publicly available. In this paper, we exploit the principle …

Inducing wireless chargers to voice out for inaudible command attacks

D Dai, Z An, L Yang - 2023 IEEE symposium on security and …, 2023 - ieeexplore.ieee.org
Recent works demonstrated that speech recognition systems or voice assistants can be
manipulated by malicious voice commands, which are injected through various inaudible …

Echo TEMPEST: EM information leakage induced by IEMI for electronic devices

S Kaji, D Fujimoto, M Kinugawa… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Electromagnetic (EM) information leakage encourages attacks, wherein the attackers
passively capture and analyze EM waves that are unintentionally generated by devices …

Electromagnetic Watermarking: Exploiting IEMI effects for forensic tracking of UAVs

JL Esteves - 2019 International Symposium on Electromagnetic …, 2019 - ieeexplore.ieee.org
We introduce for the first time the concept of electromagnetic watermarking and investigate
its practical application in the scope of forensic tracking of unmanned aerial vehicles. As …

Detection circuits for system-level signal and power noises due to high-power electromagnetic pulses

JK Paek, K Lee, J Kim - IEEE Transactions on Electromagnetic …, 2022 - ieeexplore.ieee.org
Four types of circuits for detecting system-level noises due to high-power electromagnetic
(HPEM) pulses have been proposed and implemented in compact modules. The detection …

Stochastic Kron's model inspired from the random coupling model

C Kasmi, O Maurice, G Gradoni… - 2015 IEEE …, 2015 - ieeexplore.ieee.org
Through many applications, it was demonstrated that Kron's formalism gives to
electromagnetic compatibility (EMC) challenges all the theoretical tools to analyse and to …

EMC/EMI and Functional Safety: Methodology to characterize effects of interferences on devices

C Kasmi, JL Esteves… - 2016 Asia-Pacific …, 2016 - ieeexplore.ieee.org
Electromagnetic Security refers to the compliance of electronic devices with Information
Security requirements with regards to EMC/EMI issues, and has important implications …

Electromagnetic security for information systems: statistical assessment of couplings in reverberant environments

V Houchouas - 2020 - theses.hal.science
The electromagnetic security (EMSEC) can be defined as the merging of the
electromagnetic compatibility~(EMC) and the information security. To guarantee the EMSEC …

[PDF][PDF] 放射電磁波と電磁妨害の双方を考慮した情報セキュリティの研究

鍛治秀伍, カジシュウゴ - 2023 - naist.repo.nii.ac.jp
博士論文 放射電磁波と電磁妨害の双方を考慮した 情報セキュリティの研究 鍛治 秀伍 Page 1 博士
論文 放射電磁波と電磁妨害の双方を考慮した 情報セキュリティの研究 鍛治 秀伍 奈良先端科学 …

[LIBRO][B] Instrumentation, modeling, and sound metamodeling foundations for complex hybrid systems

NA Jarus - 2021 - search.proquest.com
Many of our critical infrastructures, from power grids to water distribution networks, are
complex hybrid systems that use software to control their non-trivial physical dynamics …