24 research outputs found
Information Leakage from Optical Emanations
A previously unknown form of compromising emanations has been discovered. LED
status indicators on data communication equipment, under certain conditions,
are shown to carry a modulated optical signal that is significantly correlated
with information being processed by the device. Physical access is not
required; the attacker gains access to all data going through the device,
including plaintext in the case of data encryption systems. Experiments show
that it is possible to intercept data under realistic conditions at a
considerable distance. Many different sorts of devices, including modems and
Internet Protocol routers, were found to be vulnerable. A taxonomy of
compromising optical emanations is developed, and design changes are described
that will successfully block this kind of "Optical TEMPEST" attack.Comment: 26 pages, 11 figure
Predicting organizational identification at the CEO level
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/112192/1/smj2283.pd
IoT Security: Modeling, Development and Validation of IoT
The paper establishes a methodology and tool for modeling and describing functionality and security of an IoT. The approach allows the secure modeling, design, and validation of functional requirements, security requirements, specification, and constraints using a software engineering and digital twin prototyping concepts
Information Leakage from Optical Emanations
A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is significantly correlated with information being processed by the device. Physical access is not required; the attacker gains access to all data going through the device, including plaintext in the case of data encryption systems. Experiments show that it is possible to intercept data under realistic conditions at a considerable distance. Many different sorts of devices, including modems and Internet Protocol routers, were found to be vulnerable. A taxonomy of compromising optical emanations is developed, and design changes are described that will successfully block this kind of "Optical TEMPEST" attack
Simulation: Fast Prototyping of a Goal-Oriented Simulation Environment System
The goal-oriented Simulation Environment Systems (SES) architecture ‘humanizes‘ the problem solving process by providing a more natural scheme of model construction and experimentation over traditional simulation languages. SES is a collection of integrated tools that allows users to focus on problem solving rather than on the peripheral activities of programming. Interactive software plays a vital role in reducing the burden on the user in describing the various information types. It prompts for information regarding identification of controllable parameters, generation of the goal scenario, and definition of performance criteria. Efforts are made to supply the user with as much information as is currently defined in the model base when eliciting responses. Further, the SES model specification language is specifically designed to support a library of model parts. Such a library serves as a corporate memory of past simulation studies and contains information on component behaviours, transaction sequences, and analysis rules. © The British Computer Societ