Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations

نویسندگان

  • Markus G. Kuhn
  • Ross J. Anderson
چکیده

It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control the electromagnetic radiation it transmits. This can be used for both attack and defence. To attack a system, malicious code can encode stolen information in the machine’s RF emissions and optimise them for some combination of reception range, receiver cost and covertness. To defend a system, a trusted screen driver can display sensitive information using fonts which minimise the energy of these emissions. There is also an interesting potential application to software copyright protection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Designing of TEMPEST Security Testing Model

Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As result all equipments handling confidential information do need TEMPEST security testing. This paper attemp...

متن کامل

The Search and Reconstruction of Compromising Emanations of Laser Printers in Three Media

In this paper, the emissions of a laser printer, which may process classified information, are investigated in the media of electromagnetic radiation (ER), Power Line Conductors (PLC), and Signal Line Conductors (SLC). First, the candidate frequency points of Compromising Emanations (CE) are examined in the frequency domain. Second, the emitted signal is AM-demodulated with the proper bandwidth...

متن کامل

Soft Tempest – An Opportunity for NATO

NATO countries spend billions of dollars a year on electromagnetic security, of which the Tempest shielding of personal computers, workstations and peripherals is a large component. In the absence of a capable motivated opponent such as the former Soviet Union, this burden on both traditional and new members is increasingly difficult to justify. As a result, many systems at a medium level of se...

متن کامل

Synchronization Clock Frequency Modulation Technique for Compromising Emanations Security

The security problem of screen image leakage on a display unit through electromagnetic radiation from several meters away has attracted wide interest by security researchers since van Eck wrote about this problem. To solve the problem, techniques for reducing the S/N ratio of emanating information by signal reduction and noise generation have been proposed as countermeasures. Different from the...

متن کامل

Electromagnetic Eavesdropping Risks of Flat-Panel Displays

Electromagnetic eavesdropping of computer displays – first demonstrated to the general public by van Eck in 1985 – is not restricted to cathode-ray tubes. Modern flat-panel displays can be at least as vulnerable. They are equally driven by repetitive video signals in frequency ranges where even shielded cables leak detectable radio waves into the environment. Nearby eavesdroppers can pick up su...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998