Conference Agenda

Overview and details of the sessions of this conference. Please select a date or location to show only sessions at that day or location. Please select a single session for detailed view (with abstracts and downloads if available).

Please note that all times are shown in the time zone of the conference. The current conference time is: 29th June 2025, 08:24:44am CEST

 
 
Session Overview
Session
Physical Layer Security against Compromising Electromagnetic Emanations (Part 2)
Time:
Monday, 01/Sept/2025:
4:20pm - 5:50pm

Location: Room 107

75 seats, Tower 44, 1st floor

Session Abstract

In recent years, security measures for information systems have advanced rapidly at the application and network layers. However, the security of the underlying physical layer is equally critical. A breach at this level can fundamentally undermine the entire system’s defenses. Of particular concern are electromagnetic (EM) attacks, which can inflict severe damage while leaving little or no trace.

This tutorial session will focus on the degradation of security at the physical layer due to electromagnetic emissions. It will provide attendees with insights into these threats and effective mitigation strategies. We will primarily examine passive attacks that intercept unintentional electromagnetic emissions from electronic devices to extract confidential data—such as encryption keys—and address other emerging threats that have recently gained attention. Given the serious risks these attack vectors pose to critical infrastructure and sensitive information, the session will also discuss the urgency of defending against physical attacks in an increasingly AI-driven, information-centric society, on par with conventional cyber attacks.

The session will offer a comprehensive overview of various electromagnetic attack methods, case studies, mitigation techniques, and their impact on diverse electronic devices. Furthermore, we will explore new challenges and vulnerabilities in electromagnetic security. By fostering an environment of knowledge exchange among researchers, engineers, and security experts, our goal is to stimulate discussions on future research directions and contribute to the development of a secure and reliable electromagnetic environment.


Show help for 'Increase or decrease the abstract text size'
Presentations
4:20pm - 4:45pm

FFT-based TEMPEST receiver for compromising emanations measurements

Patrick Mayer

Rohde & Schwarz

Sensitivity, low phase noise, and noise figure are key parameters for accurate TEMPEST emanation measurements. We will examine the construction of modern digital TEMPEST receivers and identify the important parameters and capabilities necessary for measuring and analyzing the emanation of a device under test (DUT).



4:45pm - 5:10pm

TEMPEST radiated emission measurements below noise using a reverberation chamber

Frank Leferink

University of Twente and THALES Netherlands

Measuring the radiated emission from equipment is difficult, as low-noise receivers and high gain antennas are needed. High-gain means automatically low beamwidth, and therefore it is difficult to perform measurements on large equipment. A reverberation chamber is increasing thye amplitude of any emanating field, as the emitted power is reflected many times inside the RC. This creates the so-called chamber gain. The use of a VIRC allows even measurements on site. This presentation will show how this is done in practice.



5:10pm - 5:30pm

Side-channel attack: Introduction and recent trends

Naofumi Homma

Tohoku University

This talk introduces the overview and latest trends of non-invasive physical attacks against cryptographic modules. In particular, I will introduce deep-learning-based side-channel attack, and its application to post quantum cryptography (PQC), which has attracted attention in recent years.



5:30pm - 5:50pm

On-Chip Side-Channel Measurements, Simulation and Assessments

Makoto Nagata

Kobe University

On-chip measurements of power side-channel (SC) leakage will be elaborated and exploited for the following two aspects, one for validation of simulation models and the other for assessments about SC leakage tolerance, protection and avoidance of a crypto chip.



 
Contact and Legal Notice · Contact Address:
Privacy Statement · Conference: EMC Europe 2025 Paris
Conference Software: ConfTool Pro 2.6.154
© 2001–2025 by Dr. H. Weinreich, Hamburg, Germany