Information leakage from optical emanations

Author:

Loughry Joe1,Umphress David A.2

Affiliation:

1. Lockheed Martin Space Systems, Denver, CO

2. Auburn University, AL

Abstract

A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is significantly correlated with information being processed by the device. Physical access is not required; the attacker gains access to all data going through the device, including plaintext in the case of data encryption systems. Experiments show that it is possible to intercept data under realistic conditions at a considerable distance. Many different sorts of devices, including modems and Internet Protocol routers, were found to be vulnerable. A taxonomy of compromising optical emanations is developed, and design changes are described that will successfully block this kind of "Optical Tempest" attack.

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference43 articles.

1. Agilent Technologies. 1999. T-1¾ (5 mm) Diffused LED Lamps Technical Data. Agilent Technologies. Data sheet 5968-4161E (2/99).]] Agilent Technologies. 1999. T-1¾ (5 mm) Diffused LED Lamps Technical Data. Agilent Technologies. Data sheet 5968-4161E (2/99).]]

2. Anderson R. J. and Kuhn M. G. 1999. Soft tempest---an opportunity for NATO. In Protecting NATO Information Systems in the 21st Century. NATO Research & Technology Organisation Washington D.C.]] Anderson R. J. and Kuhn M. G. 1999. Soft tempest---an opportunity for NATO. In Protecting NATO Information Systems in the 21st Century. NATO Research & Technology Organisation Washington D.C.]]

3. Black U. 1996. Physical Layer Interfaces and Protocols 2nd ed. IEEE Computer Society Press Los Alamitos Calif.]] Black U. 1996. Physical Layer Interfaces and Protocols 2nd ed. IEEE Computer Society Press Los Alamitos Calif.]]

4. Common Criteria Project Sponsoring Organizations. 1999. Common Criteria for Information Technology Security Evaluation. Common Criteria Project Sponsoring Organizations. CCIMB-99-031 Version 2.1.]] Common Criteria Project Sponsoring Organizations. 1999. Common Criteria for Information Technology Security Evaluation. Common Criteria Project Sponsoring Organizations. CCIMB-99-031 Version 2.1.]]

Cited by 104 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Protecting Data at Risk of Unintentional Electromagnetic Emanation: TEMPEST Profiling;Applied Sciences;2024-06-03

2. Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED Captured by Standard Video Cameras;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19

3. Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15

4. EL-GRILLO: Leaking Data Ultrasonically from Air-Gapped PCs via the Tiny Motherboard Buzzer;2023 20th Annual International Conference on Privacy, Security and Trust (PST);2023-08-21

5. Using KNX-Based Building Automation and Control Systems for Data Exfiltration;IEEE Internet of Things Journal;2023-08-01

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3