Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3234690
|View full text |Cite
|
Sign up to set email alerts
|

Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…However, decades later, this threat still isn't well-documented and understood by the research (scientific) community. Today's VDUs are still very much affected by this eavesdropping risk as shown in the following works [4]- [8], [10]- [15]. These confirmed that VDUs in general and video data signaling cables such as VGA (video graphics array), DVI (digital visual interface), HDMI (high-definition multimedia interface) and LVDS (low-voltage differential signaling) suffer from compromising emanations.…”
Section: Introductionmentioning
confidence: 68%
“…However, decades later, this threat still isn't well-documented and understood by the research (scientific) community. Today's VDUs are still very much affected by this eavesdropping risk as shown in the following works [4]- [8], [10]- [15]. These confirmed that VDUs in general and video data signaling cables such as VGA (video graphics array), DVI (digital visual interface), HDMI (high-definition multimedia interface) and LVDS (low-voltage differential signaling) suffer from compromising emanations.…”
Section: Introductionmentioning
confidence: 68%
“…There can be some operations of the CPU that are more clearly reflected in the device's power consumption than in the EM emission and vice versa. Similarly, malware running on a victim computer can aid an EM side-channel attacker to extract additional information (over the EM side-channel alone) by intentionally modulating data into the EM emission of the CPU or the monitor [105,106,94].…”
Section: Discussionmentioning
confidence: 99%
“…Test vector leakage assessment (TVLA) is a technique that can be used to assess the resistance of cryptographic implementations against hardware sidechannel attacks [92]. TempestSDR is a software tool that can be used with a large variety of hardware platforms, e.g., the universal software radio peripheral 1 (USRP) or HackRF 2 , to eavesdrop on computer monitors by capturing the EM signals emitted by the video cables [93,94].…”
Section: Standards and Toolsmentioning
confidence: 99%
“…A more affordable choice is to use Software-Defined Radio (SDR) to intercept the signal [64][62] [63]. A bandwidth of 20 to 50 MHz is required to achieve the best video quality [57] but a lower-quality alternative is possible with a tunable TV receiver [65] which is in fact a small SDR with low bandwidth (around 2 MHz).…”
Section: A Radio Frequency Radiation Side-channelsmentioning
confidence: 99%