1,359 research outputs found

    Compromising emanations: overview and system analysis

    Get PDF
    Рассмотрена задача побочных электромагнитных излучений опасных сигналов в ближней, промежуточной и дальней зонах. Проанализированы экспериментальные данные побочных электромагнитных излучений различных технических средств. Предложен системный анализ для нахождения и изучения побочных электромагнитных излучений. Целью данного подхода является создание корректной теоретической базы в области технической защиты информации. Рассмотрен метод векторных нестационарных потенциалов для нахождения компонент электромагнитного поля опасных сигналов в ближней, промежуточной и дальней зонах излучения. Применение нового метода позволяет исследовать побочные электромагнитные излучения технических средств во временной и в частотной области

    Potential detection spectral component of compromising emanations signal USB keyboard interface

    Full text link
    Настоящая статья посвящена исследованию потенциальных возможностей обнаружения информативной и неинформативной составляющих сигнала ПЭМИ клавиатуры USB интерфейса. Проводиться цифровой эксперимент для оценки значения максимума взаимной корреляционной функции спектра сигнала ПЭМИ, снятого с двух информативных проводов, содержащего пакет опроса и ответа с данными и опорного сигнала, в зависимости от отношения сигнал/шум на входе приемного устройства для БГШ и одного из трех видов помех Джонсона с различными параметрами распределения. В результате исследования были установлены потенциальные возможности обнаружения сигнала ПЭМИ клавиатуры интерфейса USB в идеальных условиях без воздействия внешнего шума и в реальных условиях естественного и индустриального шумов. На основании полученных результатов сделан вывод о том, что излучения ПЭМИ клавиатуры интерфейса USB не являются опасными с точки зрения возможного обнаружения в реальных условиях.This article is devoted to research potential detection informative and uninformative signal components compromising emanations USB keyboard interface. Digital experiment held to assess the value of the maximum cross-correlation function of the signal spectrum compromising emanations, radiated from two informative wire containing package interrogation and response data and reference signal, depending on the signal / noise ratio at the receiver input for WGN and one of three types of interference Johnson different the parameters of the distribution. As a result, studies have established the potential of the detection signal compromising emanations keyboard USB interface in ideal conditions without the influence of external noise and the actual conditions of natural and industrial noise. Based on the results concluded that the radiation compromising emanations keyboard USB interface are not dangerous from the point of view of a possible encounter in the real conditions

    Information Leakage from Optical Emanations

    Full text link
    A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is significantly correlated with information being processed by the device. Physical access is not required; the attacker gains access to all data going through the device, including plaintext in the case of data encryption systems. Experiments show that it is possible to intercept data under realistic conditions at a considerable distance. Many different sorts of devices, including modems and Internet Protocol routers, were found to be vulnerable. A taxonomy of compromising optical emanations is developed, and design changes are described that will successfully block this kind of "Optical TEMPEST" attack.Comment: 26 pages, 11 figure

    A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems

    Full text link
    We present a taxonomy and an algebra for attack patterns on component-based operating systems. In a multilevel security scenario, where isolation of partitions containing data at different security classifications is the primary security goal and security breaches are mainly defined as undesired disclosure or modification of classified data, strict control of information flows is the ultimate goal. In order to prevent undesired information flows, we provide a classification of information flow types in a component-based operating system and, by this, possible patterns to attack the system. The systematic consideration of informations flows reveals a specific type of operating system covert channel, the covert physical channel, which connects two former isolated partitions by emitting physical signals into the computer's environment and receiving them at another interface.Comment: 9 page

    Eavesdropping on the Compromising Emanations of Electronic Equipment: The Laws of England and the United States

    Get PDF

    Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels

    Full text link
    We show that subtle acoustic noises emanating from within computer screens can be used to detect the content displayed on the screens. This sound can be picked up by ordinary microphones built into webcams or screens, and is inadvertently transmitted to other parties, e.g., during a videoconference call or archived recordings. It can also be recorded by a smartphone or "smart speaker" placed on a desk next to the screen, or from as far as 10 meters away using a parabolic microphone. Empirically demonstrating various attack scenarios, we show how this channel can be used for real-time detection of on-screen text, or users' input into on-screen virtual keyboards. We also demonstrate how an attacker can analyze the audio received during video call (e.g., on Google Hangout) to infer whether the other side is browsing the web in lieu of watching the video call, and which web site is displayed on their screen
    corecore