计算机视频泄漏信号监测平台研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机、网络和电子信息技术的发展,信息化进程不断加速,电子设备为我们生活提供了便利,然而任何电子设备工作时都会产生电磁泄漏,影响信息安全。在国际上研究信息电磁辐射泄漏的技术被称为"TEMPEST"。TEMPEST技术的研究内容主要包括:信息处理设备的泄漏辐射机理、信息泄漏辐射的防护技术和有用信息的接收和重建技术等。本论文着眼于TEMPEST技术中有用信息的接收和重建技术,对计算机系统视频信息泄漏进行研究和分析。
     文章在电磁泄漏机理基础上,讨论了计算机系统中存在的电磁辐射源及其辐射原理,指出视频显示部件为计算机系统中主要电磁泄漏源头,其包含的视频信息容易被截获并恢复。在对计算机视频显示系统中不同辐射源的辐射原理和信号类型进行了剖析后,指出泄漏视频信号主要分为视频数据信号和行同步信号。通过对两者的信号特征分析和仿真实验,阐述了视频信号接收的原理。
     本文对视频泄漏信号接收系统中存在的一些技术难题进行了研究,并提出了解决方法:1、对于弱信号的提取问题,本文提出了基于相关性技术的行同步信息提取方法和基于一维小波变换技术的视频泄漏信号去噪方法;2、对于计算机电磁辐射泄漏图像重现过程中遇到的大噪声问题,本文提出了采用多帧平均去噪滤波器和基于小波技术的滤波器两种去噪方法。这些技术在系统中起到了举足轻重的作用,对视频信号窃取与恢复有重要意义,
     随着技术的不断更新,从模拟技术到数字技术,从传统仪器到虚拟仪器,不同的方法被应用到电磁泄漏测试中。本文研究的重点是基于PXI技术的视频泄漏信号监测平台软硬件架构的设计及实际应用。基于模块化硬件和软件自定义的架构,使该监测平台集实用性、灵活性和可扩展性为一体,为泄漏信号的监测工作提供了一个完整的实验平台。该平台中提供了有效的实验方法和技术,实现了泄漏视频信号的监测功能。经过实践和总结,本文对系统平台的传输速率和计算效率的问题提出了改进方案。
The increasing development of computer, network and electronic information technology keeps on accelerating the process of informatization. Though electronic devices facilitate our life, they will cause electromagnetic leaking when working, which affects the information safety. The technology of electromagnetic leaking research is called'Tempest' in the world, which includes the principle of the compromising emanation in information processing devices, the defense technology of information compromising emanation, the technology of detection and reconstruction for valid information, etc.. Aims at the technology of detection and reconstruction for valid information, the analysis and research of the computer video leaking has been finished in this thesis.
     Based on the principle of the electromagnetic leaking, the electromagnetic leaking source and the emanation principle is demonstrated. Video Display Unit is the major electromagnetic leaking source in computer systems. The video information in Video Display Unit can easily be intercepted and reconstruction. After the discussion of the radiation principle of different electromagnetic leaking source and types of signal in the computer video-display system, it can be known that computer video leaking signals are composed of video data and horizontal synchronization signals. The principle of video signal reception is explained, after the character analysis of these two signals and simulation experiment.
     When dealing with technique problems existed in computer video leaking signal detection system, solutions are put forward in this thesis:1, to solving the problem of weak signal extraction, applying the extraction method for horizontal synchronization signals based on the correlation technique and de-noising method for video leaking signals based on the one-dimensional wavelet transform.2, to solving the problem of strong noise in the reconstruction of computer video leaking signals, applying the multi-frame average de-noising filter and the wavelet transform filter. These solutions play an important role at the computer video interception and reconstruction.
     With rapid development and refreshment of the technology, different methods and devices are applied to the electromagnetic leaking detection and measurement, including analog and digital methods; traditional and virtual instruments. The key work of this thesis is design and implementation of hardware and software structure for the video leaking detection and measurement platform based on the PXI technology. Resulting from the modularized hardware and self-defined software structure, the character of practicability, flexibility and expansibility can be applied to this platform. Offering the effective experimental method and technique, the function of the electromagnetic-leaking detection and measurement has been implemented on this platform. After practice and summarizing, the improvement solution for the problem of transmission speed and computational efficiency is finally proposed in the thesis.
引文
1.郑连清等.信息对抗原理与方法[M].北京:清华大学出版社,2005.
    2. J. McNamara. The Complete, Unofficial TEMPEST Information Page [EB/OL] http://www.eskimo.com/~joelm/tempest.html.
    3.王庆斌等.电磁干扰与电磁兼容技术[M].北京:机械工业出版社,1999.
    4. Harold Joseph Highland. The Tempest over Leaking Computers [J]. Abacus,1988,5(2): 10-18.
    5. Harold Joseph Highland. Electromagnetic Eavesdropping Machines for Christmas? [J]. Computers and Security,1998,7 (4).
    6. An Introduction to TEMPEST [EB/OL]. http://www.sans.org/reading_room/whitepapers /privacy/introduction-tempest_981.
    7. TEMPEST:a signal problem-The story of the discovery of various compromising radiations from communications and COMSEC equipment [J]. Cryptologic Spectrum,1972, Vol.2 (3).
    8. Deborah Russell, G.T. Gangemi Sr. Computer Security Basics [M]. US:O'Reilly,1991.
    9.卢硕,钟政良,万连城.计算机系统的EMC及TEMPEST [J]电子科技,2005,12(195).
    10.李海泉.计算机的防电磁泄露技术[J].微型机与应用,2000,(10)
    11.李海泉.计算机系统安全技术与方法[M].西安:西安电子科技大学出版社,1997.
    12.韩放.计算机信息电磁泄漏与防护[M].北京:科学出版社,1993.
    13.白同云.电磁兼容与防信息电磁泄漏概论[J].电磁干扰抑制术,1996,(3).
    14.雷忆三.计算机网络中的TEMPEST技术[J].电力学报,2002,17(1).
    15. What is a Real-Time Operation System (RTOS)? [EB/OL]. National Instruments Corporation, http://zone.ni.com/devzone/cda/tut/p/id/3938.
    16.余祖荣TEMPEST技术国内外发展概况[J].计算机与信息处理标准化,1996,(3):52-56.
    17. Harold Joseph Highland. Electromagnetic Radiation Revisited [J]. Computers & Security, 1986, (5):85-93,181-184.
    18. Advantages of NI Real-Time Technology [EB/OL]. National Instruments Corporation, http://zone.ni.com/devzone/cda/tut/p/id/3938.
    19. Wim van Eck. Electromagnetic Radiation from Video Display Units:An Eavesdropping Risk? [J]. Computers & Security,1985, (4):269-286.
    20. John Young. How old is TEMPEST? [EB/OL]. http://cryptome.org/tempest-old.htm.
    21. Markus G. Kuhn, Ross J. Anderson. Soft Tempest:Hidden Data Trasmission Using Electromagnetic Emanations [A]. Information Hidding, second International Workshop [C].USA:Portland, Oregon,1998.
    22. TEMPEST Timeline [EB/OL]. http://cryptome.info/0001/tempest-time.htm.
    23. NATIONAL COMSEC/EMSEC INFORMATION MEMORANDUM:NONSTOP EVALUATION TECHNIQUES. National Security Agency, Fort George G. Meade, Maryland, July 1987, Partially declassified transcript [EB/OL]. http://cryptome.info/0001/nacsem-5112.htm.
    24. NACSIM 5000 Tempest Fundamentals. National Security Agency, Fort George G. Meade, Maryland,1 February 1982, Partially declassified transcript [EB/OL]. http://cryptome.info/0001/nacsim-5000.htm.
    25. NSTISSAM TEMPEST/1-92 COMPROMISING EMANATIONS LABORATORY TEST REQUIREMENTS ELECTROMAGNETICS. National Security Agency, Fort George G. Meade, Maryland,15 December 1992, Partially declassified transcript [EB/OL]. http://cryptome.org/nstissaml-92.zip.
    26. NSTISSAM TEMPEST/2-95 RED/BLACK INSTALLATION GUIDANCE. National Security Agency, Fort George G. Meade, Maryland,12 December 1995, Partially declassified transcript [EB/OL]. http://cryptome.info/0001/tempest-2-95.htm.
    27. NSTISSI No.7000TEMPEST COUNTERMEASURES FOR FACILITIES. National Security Agency, Fort George G. Meade, Maryland,29 November 1993, Partially declassified transcript [EB/OL]. http://cryptome.org/nstissi-7000.htm.
    28. TEMPEST Level Standards [EB/OL]. SST web site, http://www.sst.ws/tempest_standards.php?pab=1_1.
    29. A. J. Mauriello. Join a government program to unveil Tempest-spec mysteries [J]. EDN, 1983,28(13):191-195.
    30.冯子腾,卢峰,刘瀚.计算机系统中的TEMPEST技术[J].成都信息工程学院学报,2004,19(3):418-421.
    31. TEMPEST Certification Program [EB/OL]. http://www.nsa.gov/applications/ia/tempest/index.cfm.
    32. Canadian Industrial TEMPEST Program (CITP) [EB/OL]. http://www.cse-cst.gc.ca/its-sti/services/industry-prog-industrie/citp-ptic-eng.html.
    33. BSI German Zoned Products List [EB/OL]. Federal Office for Information Security https://www.bsi.bund.de/cae/servlet/contentblob/471342/publicationFile/62606/TL_03305en g_pdf.pdf.
    34. THE DIRECTORY OF INFOSEC ASSURED PRODUCTS [EB/OL]. Section 13 tempest, National Technical Authority for Information Assurance,2010, http://www.cesg.gov.uk/publications/media/directory.pdf.
    35.杜虹TEMPEST:信息安全不容忽视的问题[J].信息安全与通信保密,2002,24(12)::26-28.
    36.已发布的国家保密标准[EB/OL]国家保密科学技术研究所,http://www.gbms.net.cn/View/18.
    37.缪道期.关于计算机安全学的建议[J].计算机工程与应用,1990,(2).
    38.石长生,沈宏明.第二届全国电磁兼容学术会议论文集[C].1990:530-533.
    39.刘德修,郭万里,樊昌信.92全国电磁兼容学术会议论文集[C].1992:102-105.
    40.粘华,毛陆虹,微波电磁兼容及超高频移动通信技术全国学术会议论文集[C].1992:66-88
    41.黄志洵.计算机辐射测量的内容、方法和意义[J].宇航计测技术,1993,(10).
    42.董燚鑫.计算机视频泄露信息的稳定截获技术[D].长春:中国科学院长春光学精密机械与物理研究所,1999.
    43.任华胜.计算机显示系统TEMPEST技术研究[D].西安:西安电子科技大学,2002.
    44.董士伟.信息电磁泄漏研究[D].西安:西北工业大学,2003.
    45.王欣刚.计算机视频泄漏信息截获技术的实用化研究[D].长春:中国科学院长春光学精密机械与物理研究所,2002.
    46.刘杰.泄漏发射的信息重建与防御对策[D].杭州:浙江大学,2004.
    47.张洪欣,吕英华,邱玉春,赵亮.计算机视频电磁信息泄漏效应研究[J].通信学报,2004,25(4).
    48.陈兵.计算机显示器TEMPEST检测技术[D].太原:太原科技大学,2005.
    49.李雪.CRT显示器电磁信息辐射的时域和频域分析[D].太原:太原科技大学,2007.
    50.钱照明,程肇基.电力电子系统电磁兼容设计基础及干扰抑制技术[M].杭州:浙江大学出版社,2000.
    51. Kraus, J.D. Electromagnetics (Third Edition) [M]. New York:John Wiley,1984.
    52. F.E. Terman. Electronics and Radio Engineering(Fourth Edition)[M]. Columbus:McGraw Hill,1955.
    53.白同云,吕晓德.电磁兼容设计[M].北京:北京邮电大学出版社,2001.
    54. Lothar O. (Bud) Hoeft, PhD Consultant. Analysis of Electromagnetic Shielding of Cables and Connectors [EB/OL]. Electromagnetic Effects, IEEE-EMC http://simbilder.com/ieee/34/EMag_Shielding_of_Cables_and_Connectors.pdf,2002.
    55.曲长云等.电磁发射和敏感度测量[M].南京:东南大学出版社,1998.
    56.杨顺辽,卢凌等.基于微波暗室的计算机电磁泄漏测试[J].武汉理工大学学报(交通科学与工程版),2004.
    57.周怡聪.多媒体计算机外部设备[M].北京:清华大学出版社,2002.
    58. Markus G. Kuhn. Electromagnetic eavesdropping on computers [EB/OL]. http://www.el.ema.ac.uk/-mgk25/,2002.
    59.张浩斌,吴昌英等.小波分析用于显示器电磁信息的重现[J].微电子学与计算机,2002,(8):4-6.
    60.潘加明,袁雪平.LCD显示器电磁泄漏机理分析[J].电子质量,2006,(11).
    61.石森,刘泰康等.基于红黑信号的计算机主机电磁泄漏的测试与分析[J].计算机安全,2011,(1).
    62. VESA and Industry Standards and Guidelines for Computer Display Monitor Timing(DMT)Version1.0, Revision 10[S]. Video Electronics Standards Association,2004.
    63.于锋,邹澎,李彬.计算机主板电磁泄露的分析与测量[J].计算机工程,2003,(9).
    64.丁樟德.计算机硬盘驱动器的信息泄漏及其防护技术[J].电子计算机与外部设备,1997,21(6).
    65. Peter Smulders. The Threat of Information Theft by Reception of Electromagnetic Radiation from RS-232 Cables [J]. Computers & Security,1990,9:53-58.
    66. K. Shanmugam. Digital and Analog Communication Systems[M]. New York:Wiley,1985.
    67. Frederick M. Tesche, Michel V. Ianoz, Torbjom Karlsson. EMC Analysis Methods and Computational Models [M]. New York:John Willey&Sons,1997.
    68.杨文翰,吕英华,张金玲.在局域网上截获TEMPEST辐射的实验研究[J/OL].中国科技论文在线http://www.paper.edu.cn/.
    69. CISPR 22:Information technology equipment-Radio disturbance characteristics-Limits and methods of measurement [S]. INTERNATIONAL ELECTROTECHNICAL COMMISSION,1997.
    70. MIL-STD-461E:Requirements for the control of electromagneticinterference characteristics of subsystems and equipment [S]. DEPARTMENT OF DEFENSE,1999.
    71. Hidenori Sekiguchi, Shinji Seto Security Fundamentals Group. Measurement System of Information Signal in Display Image leaking from Conducted Emission on Power leads of a Personal Computer [C]. International Symposium on Electromagnetic Compatibility,2009.
    72.杨继深.电磁兼容技术之产品研发与认证[M].北京:电子工业出版社,2004.
    73.朱葛俊,崔景,张海全.电子设备PCB电磁兼容设计的分析[J].内蒙古电力技术,2005,23(5):26-28.
    74.邱玉春,计算机有用信息的频谱特性与其泄密场辐射预测[J].计算机与信息处理标准化,1995,(4).
    75.R.米特拉著,金元松译.计算机技术在电磁学中的应用[M].北京:人民邮电出版社,1983.
    76.董士伟等.阴极射线管(CRT)显示器信息电磁泄漏频谱分析方法[J].微波学报,2003,19:79-83.
    77. F.Han. Radiation emission from CRT of computer VDU [J]. Electromagnetic Compatibility,1990.
    78. J. Mitola. The Software Radio Architecture [J]. IEEE Commun. Mag.,1995,33 (5): 26-38.
    79. E. M. Wolmarans, A. J. Truter. Software Radio:Implementation Aspects [C]. Proceedings of Information Systems for Enhanced Public Safety and Security(EURO COMM2000), 2000:38-42.
    80. E. Buracchini. The Software Radio Concept [J]. IEEE Commun. Mag.,2000,38 (9): 138-143.
    81. KR. Castleman数字图像处理[M].北京:电子工业出版社,1998.
    82. San Jose. Monitor Timing Specifications, Version 1.0, Revision0.8 [S]. California:Video Electronics Standards Association (VESA),1998.
    83. Markus G. Kuhn. Compromising emanations:eavesdropping risks of computer displays [EB/OL]. http://www.cl.cam.ac.uk/,2003.
    84. Model R-1250 Wide Range Receiver Instruction Manual, document number IM 469750B [EB/OL]. Dynamic Sciences Incorporated, http://www.dynamic-sciences.com/,1985.
    85.什么是虚拟仪器技术?[EB/OL]. http://digital.ni.com/worldwide/china.nsf/web/all/F78E6B112B2076CB48256D 720038244D?OpenDocument&node=205522_zhs.
    86.自动化仪器技术的发展历程[EB/OL]. http://digital.ni.com/worldwide/china.nsf/web/all/A4E8729FED3CE8AE48257 4320012C6F8?OpenDocument&node=205524_zhs.
    87.潘泉,张磊,孟晋丽等.小波滤波方法及应用[M].北京:清华大学出版社,2005.
    88.何毅.小波分析在视频截获图像处理中的应用研究[D].北京:中国航天第二研究院,2004.
    89. NI High-Speed Digitizers Help [Z]. National Instruments Corporation,2009.
    90.冉启文.小波分析方法及其应用[M].哈尔滨:哈尔滨工业大学出版社,1995.
    91.李建平.小波分析与信号处理—理论、应用及软件实现[M].重庆:重庆出版社,1997.
    92. NI RF Signal Analyzers Help, Version 1.5 [Z]. National Instruments Corporation,2004.
    93. Mallat S., Hwang W L. Singularity detection and processing with wavelets [J]. IEEE Trans on Information Theory,1992,38(2):617-643.
    94.柯磊,谭佳峰.微弱信号提取中的小波方法研究[J].攀枝花学院学报,2005,(3):89-90.
    95. Mallat S. A Theory for Multiresolution Signal Decomposition:the Wavelet Representation [J]. IEEE Trans on Patt Anal Mach Intell,1989,11 (7):647-69.
    96. Donoho DL. De-noising by Soft Thresholding [J]. IEEE Transactions on Information Theory,1995,41 (3):613-627.
    97. Donoho DL., Johnstone I M. Adapting to Unknown Smoothness Via Wavelet Shrinkage [J]. Journal of the American Statistical Assoc.,1995,90 (32):1200-1224.
    98. Donoho DL., Johnstone I M, Kerkyaharian G. Picard D. Wavelet shrinkage:Asymptopia? [J]. Journal of the Royal Statistical Society, Series B,1994.
    99.阮秋琦.数字图像处理学[M].北京:电子工业出版社,2001.
    100. MXI-4 datasheet specification:PC Control of PXI (MXI-4) [Z]. National Instruments Corporation,2004.
    101.冈萨雷斯著,阮宇智译.数字图像处理(第2版)[M].北京:电子工业出版社,2005.
    102.杨福生.小波变换的工程分析与应用[M].北京:科学出版社,2003:32-153.
    103. Brown T J. An adaptive strategy for wavelet based image enhancement [C]. Proceedings of Irish Machine Vision and Image Proceeding Conference,2000:256-275.
    104.李弼程,罗建书.小波分析及其应用[M].北京:电子工业出版社,2003.
    105. NI PXI-5660 Specifications [Z]. National Instruments Corporation,2009.
    106. NI PXI-5660 Getting Started Guide [Z]. National Instruments Corporation,2009.
    107. NI PXI-5620 Specifications [Z]. National Instruments Corporation,2007.
    108. NI High-Speed Digitizers Getting Started Guide [Z]. National Instruments Corporation, 2011.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700