[1] Ramsay C.TEMPEST attacks against AES[EB/OL]. https: //www.fox-it.com/en/insights/blogs/blog/tempest-attacks-aes/.
[2] Genkin D, Pachmanov L, Pipman I, et al. Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation[C]//The WorkShop on Cryptographic Hardware and Embedded Systems(CHES)2015 in September 2015.
[3] Carrara B. Air-gap covert channels[EB/OL]. https: //ruor.uottawa.ca/bitstream/10393/35103/1/Carrara_Brent_2016_thesis.pdf.
[4] Guri M, Zadov B, Bykhovsky D, et al. PowerHammer: Exfiltrating data from air-gapped computers through power lines[EB/OL]. https: //airxiv.org/pdf/1804.04014.pdf.
[5] Cui A. Funtenna[EB/OL]. https: //www.funtenna.org/CuiBH2015.pdf.
[6] Entriken W. System bus radio[EB/OL].https: //github.com/fulldecent/system-bus-radio.
[7] David A,George L. Exfiltrating reconnaissance data from air-gapped ICS/SCADA netowrks[EB/OL]. http: //www.blackhat.com/eu-17/briefings.html.
[8] Teitler L. Let’s play NSA! The hackers open-sourcing top secret spy tools[EB/OL]. http: //motherboard.vice.com/en_us/aritcle/bmjpj3/michael-ossmann-and-the-nsa-playset.