Безопасность информационных технологий (Mar 2022)

Soft tempest technology as an object of functional modeling

  • Sergey V. Skryl,
  • Ekaterina V. Vaitc,
  • Sergey S. Nikulin,
  • Roman A. Tsoy,
  • Varvara A. Antonova

DOI
https://doi.org/10.26583/bit.2022.1.11
Journal volume & issue
Vol. 29, no. 1
pp. 125 – 144

Abstract

Read online

The present study introduces the software-controlled transient electromagnetic pulse emanation technology (Soft Tempest (ST) technology) and the ST-channel information leakage counteraction in terms of functional model. The paper describes the basic formalization of the actions of the intruder to prepare targeted interception of informative signals of сomputers technique (CT) via the ST-channel. This study also profiles the malware implementation in the working environment of CT and the initiation of a transient electromagnetic pulse emanation (TEMPE) from electronic equipment of CT. The detection of a TEMPE and interception of the informative signals of the TEMPE from electronic equipment of CT and processing these signals are observed. The basic formalization of processes of changing the configuration of the electronic equipment of the CT, its instrumental verification and technical control of the effectiveness of information protection from leakage through a ST-channel are desribed. The study presents a general mechanism for the decomposition of target functions «Intruder interception of informative signals of CE via ST-channel» and «Counteracting information leakage via the ST-channel». The classification basis for the three-level detailing of these target functions is substantiated. The results of detailing the actions of the intruder into certain stages, the ongoing activities to counteract information leakage, the processes taken by the intruder, taken countermeasures and the functions corresponding to these processes and countermeasures are provided. The obtained results are a prerequisite for the formalized representation of the processes described in terms of Markov processes and the development of mathematical models of the related temporal and stochastic characteristics to quantitatively measure the ability of the intruder to realize the threats of interception of a TEMPE from the electronic equipment of CT, caused by malware.

Keywords