Remote Visualization of Screen Images Using a Pseudo-Antenna That Blends into the Mobile Environment

Yu-Ichi Hayashi, Naofumi Homma, Yohei Toriumi, Kazuhiro Takaya, Takafumi Aoki

Research output: Contribution to journalArticlepeer-review

18 Citations (Scopus)

Abstract

This paper presents a potential threat of remote visualization for screen displays of various mobile devices used in public spaces via electromagnetic waves (electromagnetic (EM) screen remote visualization). The traditional EM screen remote visualization uses nonportable equipment on a specific target device, and requires sufficient time to estimate the parameters related to information leakage of each target. In contrast, this paper proposes a method that allows for real-time estimation of information leakage parameters without requiring to know the target of remote visualization in details. The proposed method models the process of information leakage for each device, and consequently determines the frequency that leaks screen information faster than ever before. In addition, in this paper, portable equipment and a pseudo-antenna that blends into the mobile environment were used to implement the proposed method. The experiment shows that the screen image can be reconstructed from EM emanation obtained from the areas near some target devices. Furthermore, we discuss the measures against EM remote visualization of mobile devices.

Original languageEnglish
Article number7534859
Pages (from-to)24-33
Number of pages10
JournalIEEE Transactions on Electromagnetic Compatibility
Volume59
Issue number1
DOIs
Publication statusPublished - 2017 Feb

Keywords

  • Electromagnetic (EM) information leakage
  • notebook PCs
  • remote screen-image visualization
  • security of public spaces

ASJC Scopus subject areas

  • Atomic and Molecular Physics, and Optics
  • Condensed Matter Physics
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Remote Visualization of Screen Images Using a Pseudo-Antenna That Blends into the Mobile Environment'. Together they form a unique fingerprint.

Cite this