Compromising Electromagnetic Emanations of Wired and Wireless Keyboards
نویسندگان
چکیده
Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards eventually emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. The technique generally used to detect compromising emanations is based on a wide-band receiver, tuned on a specific frequency. However, this method may not be optimal since a significant amount of information is lost during the signal acquisition. Our approach is to acquire the raw signal directly from the antenna and to process the entire captured electromagnetic spectrum. Thanks to this method, we detected four different kinds of compromising electromagnetic emanations generated by wired and wireless keyboards. These emissions lead to a full or a partial recovery of the keystrokes. We implemented these sidechannel attacks and our best practical attack fully recovered 95% of the keystrokes of a PS/2 keyboard at a distance up to 20 meters, even through walls. We tested 12 different keyboard models bought between 2001 and 2008 (PS/2, USB, wireless and laptop). They are all vulnerable to at least one of the four attacks. We conclude that most of modern computer keyboards generate compromising emanations (mainly because of the manufacturer cost pressures in the design). Hence, they are not safe to transmit confidential information.
منابع مشابه
Side Channels, Compromising Emanations and Surveillance: Current and future technologies
Side channel attacks exploit implementation-specific information leakage to defeat cryptographic measures, usually designed to provide confidentiality. The majority of published attacks require physical possession or network access to the target device, and as such are not suitable for implementation by an attacker wishing to carry out a remote, passive and undetectable attack. Surveillance tec...
متن کاملThe EM Side-Channel(s)
We present results of a systematic investigation of leakage of compromising information via electromagnetic (EM) emanations from CMOS devices. These emanations are shown to consist of a multiplicity of signals, each leaking somewhat different information about the underlying computation. We show that not only can EM emanations be used to attack cryptographic devices where the power side–channel...
متن کاملThe Search and Reconstruction of Compromising Emanations of Laser Printers in Three Media
In this paper, the emissions of a laser printer, which may process classified information, are investigated in the media of electromagnetic radiation (ER), Power Line Conductors (PLC), and Signal Line Conductors (SLC). First, the candidate frequency points of Compromising Emanations (CE) are examined in the frequency domain. Second, the emitted signal is AM-demodulated with the proper bandwidth...
متن کاملThe EM Side–Channel(s):Attacks and Assessment Methodologies
We present a systematic investigation of the leakage of compromising information via electromagnetic (EM) emanations from chipcards and other devices. This information leakage differs substantially from and is more powerful than the leakage from other conventional side-channels such as timing and power. EM emanations are shown to consist of a multiplicity of compromising signals, each leaking s...
متن کاملThe Designing of TEMPEST Security Testing Model
Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As result all equipments handling confidential information do need TEMPEST security testing. This paper attemp...
متن کامل