2020 IEEE International Symposium on Electromagnetic Compatibility &Amp; Signal/Power Integrity (EMCSI) 2020
DOI: 10.1109/emcsi38923.2020.9191457
|View full text |Cite
|
Sign up to set email alerts
|

Eavesdropping a (Ultra-)High-Definition Video Display from an 80 Meter Distance Under Realistic Circumstances

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 10 publications
1
10
0
Order By: Relevance
“…Thus, it can be concluded that the compromising emission signals produced by commercial devices can be received at distances of several dozen meters. This is confirmed in practical experiments [4], in which it is possible to recover visual information from a distance of about 80 m.…”
Section: Introductionsupporting
confidence: 66%
See 2 more Smart Citations
“…Thus, it can be concluded that the compromising emission signals produced by commercial devices can be received at distances of several dozen meters. This is confirmed in practical experiments [4], in which it is possible to recover visual information from a distance of about 80 m.…”
Section: Introductionsupporting
confidence: 66%
“…In many cases, they require comparison and evaluation with the requirements that are legally protected. Therefore, the article is limited to presenting the existing threats related not only to the popularly used computer displays (described broadly in [1][2][3][4]7,9,15]), but also to the displays of VoIP terminals and hands-free mode. In the case of these devices, there is very little information about the electromagnetic safety of the processed information.…”
Section: Electromagnetic Compatibility and Protection Of Informationmentioning
confidence: 99%
See 1 more Smart Citation
“…The methods of detecting a video image leak, recovering the video synchronization parameters and finally reconstructing the video image are only briefly described in the following section. The more elaborated description of these methods can be found back in our previous work [8], [28].…”
Section: F Video Image Leakage Detection Synchronization Recovery and Reconstructionmentioning
confidence: 99%
“…Therefore, there is a risk of information leakage when a malicious attacker attempts to eavesdrop on information in the decryption phase. Attacks that acquire information at the stage where a human perceives information are known as remote visualization attacks, which eavesdrop on information through electromagnetic (EM) emanations leaked from input/output (I/O) devices [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19]. Recently, the extent of such attacks has broadened This work is licensed under a Creative Commons Attribution 4.0 License.…”
Section: Introductionmentioning
confidence: 99%