@techreport{oai:ipsj.ixsq.nii.ac.jp:00198478,
 author = {鍛治, 秀伍 and 衣川, 昌宏 and 藤本, 大介 and 林, 優一\n and Shugo, Kaji and Masahiro, Kinugawa and Daisuke, Fujimoto and Yuichi, Hayashi},
 issue = {37},
 month = {Jul},
 note = {正規に実装された機器の回路が,特定の周波数の電磁波を照射することによりハードウェアトロジャンと同等の動作をし,機器内部に実装された IC の入出力信号が電磁波を介して漏えいする脅威が報告されている.従来,このような情報漏えいを引き起す電磁波の周波数は網羅的な周波数探索によって特定されていた.これに対し,本稿では,機器の物理的な構造に着目し,このような情報漏えいを引き起す電磁波の周波数を推定する手法を提案する.提案手法の有効性を示す実験では,攻撃対象機器に接続された線路や周辺機器の総外形長の計測によって機器内部への誘導効率の良い電磁波の周波数推定を行い,推定した周波数の電磁波を攻撃対象機器に照射した.実験を行った結果,推定した周波数だけでなく,当該周波数を整数倍した電磁波の照射によって IC の入出力信号の電磁的情報漏えいが誘発されることを確認した., The threats of electromagnetic (EM) information leakage from the input/output (I/O) signal of an IC mounted on a device have been reported. The above attack is caused when attackers irradiate an EM wave of the specific frequency against properly implemented I/O circuits. Then, properly circuits behave like hardware Trojan. To be feasible the above-mentioned attack, conventional studies have searched for the broad frequency range to find frequencies available for the attack. However, this search required a lot of time. In this paper, we propose a method to estimate frequencies available for the attack by focusing on the physical structure of the device without searching for the broad frequency range. In an experiment, we measured the length of the connected line and the length of around the peripheral devices of a target device. Based on the above measurement, we extracted resonance frequencies corresponding to the total length of the target device as frequencies available for the attack Moreover, we confirmed that EM information leakage of the I/O signal of the IC by irradiating not only the estimated frequency but also its harmonics.},
 title = {電磁的情報漏えいを強制的に誘発する照射周波数推定法に関する基礎検討},
 year = {2019}
}