Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
نویسندگان
چکیده
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control the electromagnetic radiation it transmits. This can be used for both attack and defence. To attack a system, malicious code can encode stolen information in the machine’s RF emissions and optimise them for some combination of reception range, receiver cost and covertness. To defend a system, a trusted screen driver can display sensitive information using fonts which minimise the energy of these emissions. There is also an interesting potential application to software copyright protection.
منابع مشابه
The Designing of TEMPEST Security Testing Model
Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As result all equipments handling confidential information do need TEMPEST security testing. This paper attemp...
متن کاملThe Search and Reconstruction of Compromising Emanations of Laser Printers in Three Media
In this paper, the emissions of a laser printer, which may process classified information, are investigated in the media of electromagnetic radiation (ER), Power Line Conductors (PLC), and Signal Line Conductors (SLC). First, the candidate frequency points of Compromising Emanations (CE) are examined in the frequency domain. Second, the emitted signal is AM-demodulated with the proper bandwidth...
متن کاملSoft Tempest – An Opportunity for NATO
NATO countries spend billions of dollars a year on electromagnetic security, of which the Tempest shielding of personal computers, workstations and peripherals is a large component. In the absence of a capable motivated opponent such as the former Soviet Union, this burden on both traditional and new members is increasingly difficult to justify. As a result, many systems at a medium level of se...
متن کاملSynchronization Clock Frequency Modulation Technique for Compromising Emanations Security
The security problem of screen image leakage on a display unit through electromagnetic radiation from several meters away has attracted wide interest by security researchers since van Eck wrote about this problem. To solve the problem, techniques for reducing the S/N ratio of emanating information by signal reduction and noise generation have been proposed as countermeasures. Different from the...
متن کاملElectromagnetic Eavesdropping Risks of Flat-Panel Displays
Electromagnetic eavesdropping of computer displays – first demonstrated to the general public by van Eck in 1985 – is not restricted to cathode-ray tubes. Modern flat-panel displays can be at least as vulnerable. They are equally driven by repetitive video signals in frequency ranges where even shielded cables leak detectable radio waves into the environment. Nearby eavesdroppers can pick up su...
متن کامل