Screen reading: Electromagnetic information leakage from the computer monitor

نویسندگان

چکیده

Introduction/purpose: The security of systems can be jeopardized by compromising emanations. This paper provides an overview computer screen attacks. New technologies used to exfiltrate sensitive data from screens. Emission is the prevention electromagnetic signal attacks that are conducted or radiated. Methods: examines impact a side-channel attack intercepts compromised information screen. leakage also explained. Software-defined radios described explain malicious on monitors. Results: source determines nature they carry. most well-known issue associated with revealing emissions possibility intercepting visual displayed Conclusion: Visual monitors could intercepted software-defined radio which digitize desired frequency spectrum directly antenna, present it digital processor, and output application for data. A Grdović, M. et al, Screen reading: monitor, pp.836-855 variety countermeasures, such as shielding, zoning, soft TEMPEST, similar techniques, prevent leakage.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model for Electromagnetic Information Leakage

Electromagnetic leakage will happen in working information equipments; it could lead to information leakage. In order to discover the nature of information in electromagnetic leakage, this paper combined electromagnetic theory with information theory as an innovative research method. It outlines a systematic model of electromagnetic information leakage, which theoretically describes the process...

متن کامل

Research of computer electromagnetic information leakage based on three layers of protection model

The electromagnetic waves emitted by computer system at work, and may cause information leakage, will be a serious threat to information security. This paper first analyzed the mechanism of the electromagnetic information leakage based on electromagnetics and antenna theory, for the process of resulting in electromagnetic information leakage, "anti-radiation leakage”,” preventing electromagneti...

متن کامل

The problem of getting a global perspective when reading continuous texts from a computer screen

................................................................................................................. 2 The purpose of this paper ...................................................................................... 2 Reading from computer screen vs. paper .............................................................. 2 A review of some investigations comparing reading from compute...

متن کامل

Reading English in the Computer Lab

The present study compares the performance of two TEFL reading classes: one taking place in a regular classroom and the other held in a computer lab, with the learners practicing reading online. The results of an independent samples t-test showed that the difference between the learners’ scores on their reading comprehension post-tests and pretests did not differ statistically significantly fro...

متن کامل

Novel Information Leakage Threat for In- Put Operations on Touch Screen Monitors Caused by Electromagnetic Noise and Its Countermeasure Method

Information leakage of general input operations using button images in graphical user interface on touch screen monitors was experimentally investigated from images reconstructed by receiving the electromagnetic noise. In the experimental investigations for input operations of a personal identification number, it was confirmed that when a button image was touched, the touched button image can b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Vojnotehni?ki Glasnik

سال: 2022

ISSN: ['0042-8469', '2217-4753']

DOI: https://doi.org/10.5937/vojtehg70-38930