3 research outputs found
Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors
The 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany, 27- 30 2018Electromagnetic noise emitted from running computer displays modulates information about the picture frames being displayed on screen. Attacks have been demonstrated on eavesdropping computer displays by utilising these emissions as a side-channel vector. The accuracy of reconstructing a screen image depends on the emission sampling rate and bandwidth of the attackers signal acquisition hardware. The cost of radio frequency acquisition hardware increases with increased supported frequency range and bandwidth. A number of enthusiast-level, affordable software defined radio equipment solutions are currently available facilitating a number of radio-focused attacks at a more reasonable price point. This work investigates three accuracy influencing factors, other than the sample rate and bandwidth, namely noise removal, image blending, and image quality adjustments, that affect the accuracy of monitor image reconstruction through electromagnetic side-channel attacks
Security of wireless keyboards: Threats, vulnerabilities and countermeasures
Introduction/purpose: This paper provides an overview of research on
computer system vulnerabilities caused by compromised electromagnetic
radiation by wireless keyboards. Wireless devices that use event-triggered
communication have been shown to have critical privacy issues due to the
inherent leakage associated with radio frequency emissions. Wireless
connectivity technology is a source of signal emanation that must be
protected in terms of performance and security.
Methods: Wireless device vulnerabilities and side-channel attacks are
observed, along with electromagnetic emission of radio waves.
Results: The findings highlight a specific wireless keyboard's security and
encryption flaws. The results of penetration testing reveal vulnerabilities of
targeted wireless keyboards in terms of outdated firmware, encryption,
wireless reliability, and connection strength.
Conclusion: Wireless keyboards have security flaws that disrupt radio
communication, giving a malicious user complete access to the computer
to which the keyboard is connected. An attacker can steal sensitive data
by observing how the system works using compromised electromagnetic
emissions
Systematic Literature Review of EM-SCA Attacks on Encryption
Cryptography is vital for data security, but cryptographic algorithms can
still be vulnerable to side-channel attacks (SCAs), physical assaults
exploiting power consumption and EM radiation. SCAs pose a significant threat
to cryptographic integrity, compromising device keys. While literature on SCAs
focuses on real-world devices, the rise of sophisticated devices necessitates
fresh approaches. Electromagnetic side-channel analysis (EM-SCA) gathers
information by monitoring EM radiation, capable of retrieving encryption keys
and detecting malicious activity. This study evaluates EM-SCA's impact on
encryption across scenarios and explores its role in digital forensics and law
enforcement. Addressing encryption susceptibility to EM-SCA can empower
forensic investigators in overcoming encryption challenges, maintaining their
crucial role in law enforcement. Additionally, the paper defines EM-SCA's
current state in attacking encryption, highlighting vulnerable and resistant
encryption algorithms and devices, and promising EM-SCA approaches. This study
offers a comprehensive analysis of EM-SCA in law enforcement and digital
forensics, suggesting avenues for further research