Publication | Closed Access
What can be learned from documented Intentional Electromagnetic Interference (IEMI) attacks?
44
Citations
1
References
2011
Year
Unknown Venue
Hardware SecurityElectrical EngineeringThreat (Computer)EngineeringInformation SecurityIntentional Electromagnetic InterferencePhysical SecurityIemi AttackElectromagnetic ToolsControl System SecurityElectromagnetic InterferenceComputational ElectromagneticsCommunicationSide-channel AttackTechnologyDefence TechnologyElectromagnetic CompatibilityMisbehaviour Detection
The existing threat by criminal (intentional) use of electromagnetic tools is investigated. Reported Intentional Electromagnetic Interference (IEMI) attacks and similar incidents will be analyzed and discussed in regard to aspects like motivation and technical skills of the culprits, characteristics of the generated IEMI environment as well as effects on the target systems. Concluding common characteristics will lead to a discussion of the technological challenge of recognition and identification of an IEMI attack as well as backtracking of observed malfunction and destructions to an external IEMI environment.
| Year | Citations | |
|---|---|---|
Page 1
Page 1