ABSTRACT
Electromagnetic noise emitted from running computer displays modulates information about the picture frames being displayed on screen. Attacks have been demonstrated on eavesdropping computer displays by utilising these emissions as a side-channel vector. The accuracy of reconstructing a screen image depends on the emission sampling rate and bandwidth of the attackers signal acquisition hardware. The cost of radio frequency acquisition hardware increases with increased supported frequency range and bandwidth. A number of enthusiast-level, affordable software defined radio equipment solutions are currently available facilitating a number of radio-focused attacks at a more reasonable price point. This work investigates three accuracy influencing factors, other than the sample rate and bandwidth, namely noise removal, image blending, and image quality adjustments, that affect the accuracy of monitor image reconstruction through electromagnetic side-channel attacks.
- Stephen Butterworth. 1930. On the Theory of Filter Amplifiers. Wireless Engineer 7, 6 (1930), 536--541.Google Scholar
- Fürkan Elibol, Uğur Sarac, and Işin Erer. 2012. Realistic Eavesdropping Attacks on Computer Displays with Low-cost and Mobile Receiver System. In Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European. IEEE, 1767--1771.Google Scholar
- Daniel Genkin, Adi Shamir, and Eran Tromer. 2014. RSA Key Extraction via Low-bandwidth Acoustic Cryptanalysis. In International Cryptology Conference. Springer, 444--461.Google ScholarCross Ref
- Robin Getz and Bob Moeckel. 1996. Understanding and eliminating EMI in Microcontroller Applications. National Semiconductor (1996).Google Scholar
- Yu-ichi Hayashi. 2016. State-of-the-art Research on Electromagnetic Information Security. Radio Science 51, 7 (2016), 1213--1219.Google ScholarCross Ref
- Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, and Nhien-An Le-Khac. 2018. Digital Forensic Investigation of Two-Way Radio Communication Equipment and Services. Digital Investigation 26S, 1 (07 2018).Google Scholar
- Markus Guenther Kuhn. 2002. Compromising Emanations: Eavesdropping Risks of Computer Displays. Ph.D. Dissertation. University of Cambridge.Google Scholar
- Martin Marinov. 2018. TempestSDR Remote Video Eavesdropping using a Software-defined Radio Platform. (2018). https://github.com/martinmarinov/TempestSDR, Last accessed on 2018-02-01.Google Scholar
- Samuel Joseph O'Malley and Kim-Kwang Raymond Choo. 2014. Bridging the Air Gap: Inaudible Data Exfiltration by Insiders. In 20th Americas Conference on Information Systems (AMCIS). Association for Information Systems.Google Scholar
- Michael Ossmann. 2016. Software Defined Radio with HackRF. Great Scott Gadgets, https.V/greatscottgadgets.com/sdr (2016).Google Scholar
- Henry W Ott. 2011. Electromagnetic Compatibility Engineering. John Wiley & Sons. Google ScholarDigital Library
- Asanka Sayakkara, Nhien-An Le-Khac, and Mark Scanlon. 2018. Electromagnetic Side-Channel Attacks: Potential for Progressing Hindered Digital Forensic Analysis. In Proceedings of the International Workshop on Speculative Side Channel Analysis (WoSSCA 2018). ACM, Amsterdam, Netherlands.Google ScholarDigital Library
- Wim Van Eck. 1985. Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? Computers & Security 4, 4 (1985), 269--286. Google ScholarDigital Library
- Zhou Wang, Alan C Bovik, Hamid R Sheikh, and Eero P Simoncelli. 2004. Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE transactions on image processing 13, 4 (2004), 600--612. Google ScholarDigital Library
- Alenka Zajic and Milos Prvulovic. 2014. Experimental Demonstration of Electromagnetic Information Leakage from Modern Processor-memory Systems. IEEE Transactions on Electromagnetic Compatibility 56, 4 (2014), 885--893.Google ScholarCross Ref
Index Terms
- Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors
Recommendations
Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis
ISSTA '18: Companion Proceedings for the ISSTA/ECOOP 2018 WorkshopsDigital forensics is fast-growing field involving the discovery and analysis of digital evidence acquired from electronic devices to assist investigations for law enforcement. Traditional digital forensic investigative approaches are often hampered by ...
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityModern operating systems use hardware support to protect against control-flow hijacking attacks such as code-injection attacks. Typically, write access to executable pages is prevented and kernel mode execution is restricted to kernel code pages only. ...
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
AbstractSide-channels are unintended pathways within target systems that leak internal information, exploitable via side-channel attack techniques that extract the target information, compromising the system’s security and privacy. Side-channel attacks ...
Comments