*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************
Title: Analyzing Software using Unintentional Electromagnetic Emanations from Computing Devices
Committee:
Dr. Zajic, PrvulovicAdvisor
Dr. Qureshi, Chair
Dr. Yalamanchili
Abstract: The objective of the proposed research is to identify, quantify, and use information leaked in Electromagnetic (EM) emanations generated by a broad range of computing devices in a general way by synthesizing techniques from the fields of electromagnetics, computer architecture, and software engineering. Computers emit EM radiation (emanations) due to the voltage and current variations required to perform computation. Cryptography researchers have developed ad-hoc and application specific "side channel" analysis techniques that use EM emanations to extract secret cryptographic keys from simple computing devices. However, EM emanations contain a great deal more information about system and program activity that may used in other applications such as detecting malware, profiling, and debugging. The proposed research will advance these applications by developing general methods for identifying which system signals leak information, quantifying how each software and hardware component contributes to leakage, and using the leaked information to profile computer programs.