• When hardware is tampered with additional ‘spying’ components, local Electro‐magnetic (EM)
pattern will be disturbed/changed, and show a different pattern.
• The need for the detection of hardware tampering could be monitored and detected by this
method outlined, through the comparison to ‘ground state’ of local EM field and pattern
recognition, then notify administrator and/or end user.
Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 4.0 License.
INC, HP, "A METHOD OF DETECTING TEMPERING ON COMPUTING DEVICES BY MONITORING ELECTRO-MAGNETIC PATTERN", Technical Disclosure Commons, (February 20, 2019)