Compromising Electromagnetic Emanations of Wired and Wireless Keyboards

نویسندگان

  • Martin Vuagnoux
  • Sylvain Pasini
چکیده

Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards eventually emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. The technique generally used to detect compromising emanations is based on a wide-band receiver, tuned on a specific frequency. However, this method may not be optimal since a significant amount of information is lost during the signal acquisition. Our approach is to acquire the raw signal directly from the antenna and to process the entire captured electromagnetic spectrum. Thanks to this method, we detected four different kinds of compromising electromagnetic emanations generated by wired and wireless keyboards. These emissions lead to a full or a partial recovery of the keystrokes. We implemented these sidechannel attacks and our best practical attack fully recovered 95% of the keystrokes of a PS/2 keyboard at a distance up to 20 meters, even through walls. We tested 12 different keyboard models bought between 2001 and 2008 (PS/2, USB, wireless and laptop). They are all vulnerable to at least one of the four attacks. We conclude that most of modern computer keyboards generate compromising emanations (mainly because of the manufacturer cost pressures in the design). Hence, they are not safe to transmit confidential information.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side Channels, Compromising Emanations and Surveillance: Current and future technologies

Side channel attacks exploit implementation-specific information leakage to defeat cryptographic measures, usually designed to provide confidentiality. The majority of published attacks require physical possession or network access to the target device, and as such are not suitable for implementation by an attacker wishing to carry out a remote, passive and undetectable attack. Surveillance tec...

متن کامل

The EM Side-Channel(s)

We present results of a systematic investigation of leakage of compromising information via electromagnetic (EM) emanations from CMOS devices. These emanations are shown to consist of a multiplicity of signals, each leaking somewhat different information about the underlying computation. We show that not only can EM emanations be used to attack cryptographic devices where the power side–channel...

متن کامل

The Search and Reconstruction of Compromising Emanations of Laser Printers in Three Media

In this paper, the emissions of a laser printer, which may process classified information, are investigated in the media of electromagnetic radiation (ER), Power Line Conductors (PLC), and Signal Line Conductors (SLC). First, the candidate frequency points of Compromising Emanations (CE) are examined in the frequency domain. Second, the emitted signal is AM-demodulated with the proper bandwidth...

متن کامل

The EM Side–Channel(s):Attacks and Assessment Methodologies

We present a systematic investigation of the leakage of compromising information via electromagnetic (EM) emanations from chipcards and other devices. This information leakage differs substantially from and is more powerful than the leakage from other conventional side-channels such as timing and power. EM emanations are shown to consist of a multiplicity of compromising signals, each leaking s...

متن کامل

The Designing of TEMPEST Security Testing Model

Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As result all equipments handling confidential information do need TEMPEST security testing. This paper attemp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009