Soft tempest technology as an object of functional modeling
The present study introduces the software-controlled transient electromagnetic pulse emanation technology (Soft Tempest (ST) technology) and the ST-channel information leakage counteraction in terms of functional model. The paper describes the basic formalization of the actions of the intruder to pr...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2022-03-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/1412 |
_version_ | 1797710975333302272 |
---|---|
author | Sergey V. Skryl Ekaterina V. Vaitc Sergey S. Nikulin Roman A. Tsoy Varvara A. Antonova |
author_facet | Sergey V. Skryl Ekaterina V. Vaitc Sergey S. Nikulin Roman A. Tsoy Varvara A. Antonova |
author_sort | Sergey V. Skryl |
collection | DOAJ |
description | The present study introduces the software-controlled transient electromagnetic pulse emanation technology (Soft Tempest (ST) technology) and the ST-channel information leakage counteraction in terms of functional model. The paper describes the basic formalization of the actions of the intruder to prepare targeted interception of informative signals of сomputers technique (CT) via the ST-channel. This study also profiles the malware implementation in the working environment of CT and the initiation of a transient electromagnetic pulse emanation (TEMPE) from electronic equipment of CT. The detection of a TEMPE and interception of the informative signals of the TEMPE from electronic equipment of CT and processing these signals are observed. The basic formalization of processes of changing the configuration of the electronic equipment of the CT, its instrumental verification and technical control of the effectiveness of information protection from leakage through a ST-channel are desribed. The study presents a general mechanism for the decomposition of target functions «Intruder interception of informative signals of CE via ST-channel» and «Counteracting information leakage via the ST-channel». The classification basis for the three-level detailing of these target functions is substantiated. The results of detailing the actions of the intruder into certain stages, the ongoing activities to counteract information leakage, the processes taken by the intruder, taken countermeasures and the functions corresponding to these processes and countermeasures are provided. The obtained results are a prerequisite for the formalized representation of the processes described in terms of Markov processes and the development of mathematical models of the related temporal and stochastic characteristics to quantitatively measure the ability of the intruder to realize the threats of interception of a TEMPE from the electronic equipment of CT, caused by malware. |
first_indexed | 2024-03-12T07:00:12Z |
format | Article |
id | doaj.art-8dd7f41fa2284c3aa35947b04a11b4ea |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T07:00:12Z |
publishDate | 2022-03-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-8dd7f41fa2284c3aa35947b04a11b4ea2023-09-02T23:46:49ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362022-03-0129112514410.26583/bit.2022.1.111261Soft tempest technology as an object of functional modelingSergey V. Skryl0Ekaterina V. Vaitc1Sergey S. Nikulin2Roman A. Tsoy3Varvara A. Antonova4Bauman Moscow State Technical University (National Research University)Bauman Moscow State Technical University (National Research University)Bauman Moscow State Technical University (National Research University)Bauman Moscow State Technical University (National Research University)Bauman Moscow State Technical University (National Research University)The present study introduces the software-controlled transient electromagnetic pulse emanation technology (Soft Tempest (ST) technology) and the ST-channel information leakage counteraction in terms of functional model. The paper describes the basic formalization of the actions of the intruder to prepare targeted interception of informative signals of сomputers technique (CT) via the ST-channel. This study also profiles the malware implementation in the working environment of CT and the initiation of a transient electromagnetic pulse emanation (TEMPE) from electronic equipment of CT. The detection of a TEMPE and interception of the informative signals of the TEMPE from electronic equipment of CT and processing these signals are observed. The basic formalization of processes of changing the configuration of the electronic equipment of the CT, its instrumental verification and technical control of the effectiveness of information protection from leakage through a ST-channel are desribed. The study presents a general mechanism for the decomposition of target functions «Intruder interception of informative signals of CE via ST-channel» and «Counteracting information leakage via the ST-channel». The classification basis for the three-level detailing of these target functions is substantiated. The results of detailing the actions of the intruder into certain stages, the ongoing activities to counteract information leakage, the processes taken by the intruder, taken countermeasures and the functions corresponding to these processes and countermeasures are provided. The obtained results are a prerequisite for the formalized representation of the processes described in terms of Markov processes and the development of mathematical models of the related temporal and stochastic characteristics to quantitatively measure the ability of the intruder to realize the threats of interception of a TEMPE from the electronic equipment of CT, caused by malware.https://bit.mephi.ru/index.php/bit/article/view/1412soft tempest technology, information leakage, interception of informative signals of сomputers technique (ct) via the st-channel, software-controlled transient electromagnetic pulse emanation. |
spellingShingle | Sergey V. Skryl Ekaterina V. Vaitc Sergey S. Nikulin Roman A. Tsoy Varvara A. Antonova Soft tempest technology as an object of functional modeling Безопасность информационных технологий soft tempest technology, information leakage, interception of informative signals of сomputers technique (ct) via the st-channel, software-controlled transient electromagnetic pulse emanation. |
title | Soft tempest technology as an object of functional modeling |
title_full | Soft tempest technology as an object of functional modeling |
title_fullStr | Soft tempest technology as an object of functional modeling |
title_full_unstemmed | Soft tempest technology as an object of functional modeling |
title_short | Soft tempest technology as an object of functional modeling |
title_sort | soft tempest technology as an object of functional modeling |
topic | soft tempest technology, information leakage, interception of informative signals of сomputers technique (ct) via the st-channel, software-controlled transient electromagnetic pulse emanation. |
url | https://bit.mephi.ru/index.php/bit/article/view/1412 |
work_keys_str_mv | AT sergeyvskryl softtempesttechnologyasanobjectoffunctionalmodeling AT ekaterinavvaitc softtempesttechnologyasanobjectoffunctionalmodeling AT sergeysnikulin softtempesttechnologyasanobjectoffunctionalmodeling AT romanatsoy softtempesttechnologyasanobjectoffunctionalmodeling AT varvaraaantonova softtempesttechnologyasanobjectoffunctionalmodeling |