Evaluation of EM information leakage caused by IEMI with hardware Trojan

Masahiro Kinugawa, Yu Ichi Hayashi, Tatsuya Mori

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)


Hardware Trojans (HT) that are implemented at the time of manufacturing ICs are being reported as a new threat that could destroy the IC or degrade its security under specific circumstances, and is becoming a key security challenge that must be addressed. On the other hand, since it is also common to use components manufactured or bought via third parties in portions outside of the substrate on which the IC is mounted or communication lines connecting the IC and the substrate, there is a possibility that HTs may also be set in the peripheral circuits of the IC in the same manner as in the IC. In this paper, we developed an HT that could be implemented in the peripheral circuits and wiring of an IC, investigated the possibility of being able to acquire information processed inside a device by measuring the electromagnetic waves generated and leaked by Intentional Electromagnetic Interference (IEMI) with HT outside the device, and investigated detection methods for cases where such HTs are implemented.

Original languageEnglish
Pages (from-to)153-157
Number of pages5
JournalIEEJ Transactions on Fundamentals and Materials
Issue number3
Publication statusPublished - 2017


  • Electromagnetic information leakage
  • Hardware Trojans
  • Intentional electromagnetic interference

ASJC Scopus subject areas

  • Electrical and Electronic Engineering


Dive into the research topics of 'Evaluation of EM information leakage caused by IEMI with hardware Trojan'. Together they form a unique fingerprint.

Cite this