{"id":168141,"updated":"2025-01-20T09:27:17.422346+00:00","links":{},"created":"2025-01-19T00:39:15.623082+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00168141","sets":["1164:3925:8483:8759"]},"path":["8759"],"owner":"11","recid":"168141","title":["電波再帰反射攻撃成立条件の評価と対策"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-07-07"},"_buckets":{"deposit":"821314e7-0210-4b90-9ccc-642ede207485"},"_deposit":{"id":"168141","pid":{"type":"depid","value":"168141","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"電波再帰反射攻撃成立条件の評価と対策","author_link":["336131","336136","336135","336132","336134","336138","336133","336137"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"電波再帰反射攻撃成立条件の評価と対策"},{"subitem_title":"On the Conditions for Successful RF Retroreflector Attacks","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2016-07-07","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"早稲田大学基幹理工学部"},{"subitem_text_value":"仙台高等専門学校情報ネットワーク工学科"},{"subitem_text_value":"東北学院大学工学部"},{"subitem_text_value":"早稲田大学基幹理工学部"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Communication Engineering, Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Department of Information Networks, National Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Engineering, Tohoku Gakuin University","subitem_text_language":"en"},{"subitem_text_value":"Department of Communication Engineering, Waseda University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/168141/files/IPSJ-CSEC16074011.pdf","label":"IPSJ-CSEC16074011.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC16074011.pdf","filesize":[{"value":"3.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"42e7c1dd-0206-4d61-adc9-2eae93a33a9e","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"星野, 遼"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"衣川, 昌宏"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"林, 優一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森, 達哉"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Haruka, Hoshino","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masahiro, Kinugawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuichi, Hayashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tatsuya, Mori","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"電波再帰反射攻撃 (RFRA; RF retroreflector attack) はサイドチャネル攻撃の一種である.攻撃者がハードウェアトロイが埋め込まれた標的デバイスに電波を照射すると,デバイス内の信号で変調された反射波が外部に漏えいする. その反射波を受信・復調することによってデバイス内の信号を遠隔から読み取る攻撃が成立する. これまでに RFRA の基本原理や実験室での成功例が数例報告されてきたが,RFRA がどのような条件下で成立するかは未解決の問題であった.本研究の目的は,RFRA の攻撃成立条件を実験的な手法で明らかにすることである.攻撃が成功する条件を明らかにすることにより,有効な攻撃対策手法を講じることができる.攻撃成立条件として,本研究では攻撃者と標的の距離,照射する電波強度,および攻撃が成立する標的信号周波数を調査した.評価用の回路を使った実験の結果,標的の信号が 1kHz の場合,照射電波強度が 0dBm(1mW) 程度の微弱な信号であっても 3m の距離までは攻撃が成功することを明らかにした. また実際に標的となるハードウェアの例として,PS/2 キーボード入力を標的とした実験を行った結果,照射電波強度が 8dBm (約 6.3mW) の条件下で,距離が 1.4m 以内であれば 100%の割合で攻撃が成功すること,ただしそれから少しでも距離を延ばすと直ちに成功率が 0%になることを示した.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"RF retrorefeflector attack (RFRA) is a side-channel attack that aims to leak the target's internal signals by irradiating radio frequency to the targetted device. There have been few studies that presented the basic mechanism of RFRA and demonstrated the success of attack, to the best of our knowledge, the conditions for successful attack have not been studied so far. This work aims to empirically study the conditions for successful RFRA. Extracting such conditions should help to come up with effective countermeasures against the attack. As the conditions for successful attack, we studied the distance between attacker and target, power of illuminating RF, and the frequencies of the target signal. Through the extensive experiments using experimental hardware circuits, we revelaed that even though the power of illuminating RF is fairly low, i.e., 0 dBm, RFRA to the target with 1 kHz signal worked for the distance up to 3 meter. We also studied the real-world hardware — PS/2 keyboard, and demonstrated that 100 % of key inputs were successfully recovered with the conditions of 8 dBm of illuminating RF and 1.4 meter of distance.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2016-07-07","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"11","bibliographicVolumeNumber":"2016-CSEC-74"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}