Acoustic Surveillance of Physically Unmodified PCs.

作者: Michael LeMay , Jack Tan

DOI:

关键词:

摘要: Computer equipment produces a wide range of emanations in the visible, electromagnetic, and acoustic spectra. It is well known that electromagnetic can reveal information about operations being performed by machine, it has recently been shown do same. Additionally, techniques have developed to manipulate so they surreptitiously transmit data remote receiver. In this paper, we similarly demonstrate how be manipulated arbitrary show technique used create practical, software-only keylogger. Finally, recommend countermeasures prevent such an attack from performed.

参考文章(3)
David Wagner, Dawn Xiaodong Song, Xuqing Tian, Timing analysis of keystrokes and timing attacks on SSH usenix security symposium. pp. 25- 25 ,(2001)
Markus G. Kuhn, Ross J. Anderson, Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations information hiding. pp. 124- 142 ,(1998) , 10.1007/3-540-49380-8_10
D. Asonov, R. Agrawal, Keyboard acoustic emanations ieee symposium on security and privacy. pp. 3- 11 ,(2004) , 10.1109/SECPRI.2004.1301311