Browse > Article
http://dx.doi.org/10.5370/KIEE.2014.63.11.1571

A Study on Leakage of Critical Information via the Power Analysis of Power Lines  

Han, Kyong-Ho (Dept. of Electrical and Electronic Engineering, Dankook University)
Lee, Seong-Ho (Dept. of Electrical and Electronic Engineering, Dankook University)
Publication Information
The Transactions of The Korean Institute of Electrical Engineers / v.63, no.11, 2014 , pp. 1571-1574 More about this Journal
Abstract
In this paper, we propose a unidirectional transmission of critical information obtained by keyboard hacking or kernel and keyboard driver hacking even though the computer is not connected to the external network. We show the hacking can be attempted in the proposed method to show the way preventing such attempts in advance. Firewalls and other various methods are used to prevent the hacking from the external network but the hacking is also attempted in various ways to detour the firewall. One of the most effective way preventing from the hacking attack is physically disconnect the internal intranet systems from the external internet and most of the government systems, military systems and big corporate systems are using this way as on one of the protection method. In this paper, we show the feasibility of transmission of security codes, etc via the short message to the external network on the assumption that a hacking program such as Trojan Horse is installed on the computer systems separated from the external network. Previous studies showed that the letters on the monitor can be hijacked by electromagnetic analysis on the computer to obtain the information even though the system is not connected ti the network. Other studies showed that the security code hint can obtained by analyzing the power consumption distribution of CPU. In this paper, the power consumption distribution of externally accessible power line is analyzed to obtain the information and the information can be transmitted to the external network. Software controlling the CPU and GPU usage is designed to control the power supply of computer. The sensors such as the Rogowski coils can be used on the external power line to collect the data of power consumption change rates. To transmit the user password by short message, due to the capacitive components and the obstacle from other power supply, A very slow protocol are used.
Keywords
Power Analysis; Hacking; one way send information; Rogowski coils; Network; Firewall;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Kyong-Ho Han "Coding Method of Variable Threshold Dual Rate ADPCM Speech Considering the Background Noise" Journal of the korean institute of llluminating and Electrical installation Engineers Vol, 17.No 6,pp. 154-159 September 2003.   과학기술학회마을   DOI   ScienceOn
2 Seong-hee Park, Kee-Joe Lim, Kil-Sou Kim and Seong-Hwa Kang, "Output Characteristics of Current Sensor and Voltage Sensor Built in Epoxy Spacer" Trans. KIEE Vol 56, No 2, FEB 2007   과학기술학회마을
3 Lennar Ljung, "Black box model from input output measurement." 18Th IEEE Instrumentation and Measurement Technology Conference, Budapest, Hungary ,2001:21-23
4 Nannan Yan, Zhengcai Fu, "The Impact of Current-carrying Bus Decentration and Inclination on Impulse Current Measurement by Large Size Rogowski Coils" 2012 International Conference on High Voltage Engineering and Application, Shanghai, China, September 17-20, 2012
5 Qizhi Tian, Sorin A. Huss, "On the Attack of Misaligned Traces by Power Analysis Methods" ICCES Seventh Internation Conference on, Nov, 2012
6 Microsoft MSDN Web Page: http://blogs.msdn.com/b/ie/archive/2011/03/28/browser-power-consumption-leading-the-industry-with-internet-explorer-9.aspx.
7 Kyong-Ho Han and Ha-Yoon Hwang, "Implementation of Dual Voltage Level DC Power Line Communication Driver for Multiple Access Serial Bidirectional Communication" Journal of the Korean Institute of IIIuminating and Electrical Installation Engineers Vol. 23, No.10, pp. 29-35 October 2009.   과학기술학회마을   DOI   ScienceOn