检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:姚沛嵩 刘测产 潘晓 徐东升 刘洁 周程辉 YAO Peisong;LIU Cechan;PAN Xiao;XU Dongsheng;LIU Jie;ZHOU Chenghui(Unit 63796 of PLA,Xichang Sichuan 615000,China)
机构地区:[1]中国人民解放军63796部队,四川西昌615000
出 处:《通信技术》2023年第8期1014-1024,共11页Communications Technology
摘 要:基于传导性电磁泄漏波仿真了针对物理隔离工业控制系统的入侵过程,检验了物理隔离系统的防护能力。研究表明,在工业控制系统电路中常见的300 kHz到50 MHz电磁波段中,通信木马发送端在不引起隔离区AI模拟量采集模块的采集值明显改变的时候隐蔽性最好;入侵电磁波信号使用15 MHz频率发起攻击时通信木马接收端接收效果最好;当被攻击的物理隔离系统的防护能力平均达到-30 dBmV时,以潜伏通信为目的而不以破坏干扰为目的的硬件木马较难通过传导性电磁泄漏波的方式发挥通信作用。Based on conductive electromagnetic leakage wave attacks,this paper simulates the intrusion process against a physically isolated industrial control system and tests the protection capability of the physically isolated system.Research shows that in the electromagnetic band from 300 kHz to 50 MHz,which is common in industrial control system circuits,the communication Trojan sending end has the best concealment when the acquisition value of AI analog acquisition module in the isolation area is not caused to change obviously;When the intrusion electromagnetic wave signal uses 15 MHz to launch an attack,the receiving end of the communication Trojan has the best receiving effect;When the protection capability of the attacked physical isolation system reaches-30 dBmV on average,hardware Trojans aiming at latent communication but not destroying interference are difficult to play a communication role through conductive electromagnetic leakage waves.
关 键 词:TEMPEST 电磁泄漏 物理隔离 工业控制系统 入侵
分 类 号:TP309.1[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.144.115.20