24 research outputs found

    Information Leakage from Optical Emanations

    Full text link
    A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is significantly correlated with information being processed by the device. Physical access is not required; the attacker gains access to all data going through the device, including plaintext in the case of data encryption systems. Experiments show that it is possible to intercept data under realistic conditions at a considerable distance. Many different sorts of devices, including modems and Internet Protocol routers, were found to be vulnerable. A taxonomy of compromising optical emanations is developed, and design changes are described that will successfully block this kind of "Optical TEMPEST" attack.Comment: 26 pages, 11 figure

    IoT Security: Modeling, Development and Validation of IoT

    Get PDF
    The paper establishes a methodology and tool for modeling and describing functionality and security of an IoT. The approach allows the secure modeling, design, and validation of functional requirements, security requirements, specification, and constraints using a software engineering and digital twin prototyping concepts

    Information Leakage from Optical Emanations

    No full text
    A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is significantly correlated with information being processed by the device. Physical access is not required; the attacker gains access to all data going through the device, including plaintext in the case of data encryption systems. Experiments show that it is possible to intercept data under realistic conditions at a considerable distance. Many different sorts of devices, including modems and Internet Protocol routers, were found to be vulnerable. A taxonomy of compromising optical emanations is developed, and design changes are described that will successfully block this kind of "Optical TEMPEST" attack

    Simulation: Fast Prototyping of a Goal-Oriented Simulation Environment System

    No full text
    The goal-oriented Simulation Environment Systems (SES) architecture ‘humanizes‘ the problem solving process by providing a more natural scheme of model construction and experimentation over traditional simulation languages. SES is a collection of integrated tools that allows users to focus on problem solving rather than on the peripheral activities of programming. Interactive software plays a vital role in reducing the burden on the user in describing the various information types. It prompts for information regarding identification of controllable parameters, generation of the goal scenario, and definition of performance criteria. Efforts are made to supply the user with as much information as is currently defined in the model base when eliciting responses. Further, the SES model specification language is specifically designed to support a library of model parts. Such a library serves as a corporate memory of past simulation studies and contains information on component behaviours, transaction sequences, and analysis rules. © The British Computer Societ
    corecore