|
This page contains all of the posts and discussion on MemeStreams referencing the following web page: Acoustic cryptanalysis. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.
|
Acoustic cryptanalysis by dmv at 1:04 pm EDT, May 8, 2004 |
] The following demonstrates some preliminary results in ] the analysis of acoustic emanations from personal ] computers, showing them to be a surprisingly rich source ] of information on CPU activity. |
Acoustic Cryptanalysis by jlang at 5:28 pm EDT, May 10, 2004 |
A powerful method for extracting information from supposedly secure systems is side-channel attacks: cryptanalytic techniques that rely on information unintentionally leaked by computing devices. Most side-channel attack research has focused on electromagnetic emanations (TEMPEST), power consumption and, recently, diffuse visible light from CRT displays. The oldest eavesdropping channel, namely acoustic emanations, has received little attention. Our preliminary analysis of acoustic emanations from personal computers shows them to be a surprisingly rich source of information on CPU activity. |
Acoustic Cryptanalysis by Rattle at 8:38 pm EDT, May 10, 2004 |
A powerful method for extracting information from supposedly secure systems is side-channel attacks: cryptanalytic techniques that rely on information unintentionally leaked by computing devices. Most side-channel attack research has focused on electromagnetic emanations (TEMPEST), power consumption and, recently, diffuse visible light from CRT displays. The oldest eavesdropping channel, namely acoustic emanations, has received little attention. Our preliminary analysis of acoustic emanations from personal computers shows them to be a surprisingly rich source of information on CPU activity. Not only is this interesting, but it also gives me a good reason for using my IBM Thinkpad as a mobile development platform. According to this, they do not give away much information that can be gathered using these techniques. |
Acoustic Cryptanalysis by Jeremy at 2:34 am EDT, May 11, 2004 |
A powerful method for extracting information from supposedly secure systems is side-channel attacks: cryptanalytic techniques that rely on information unintentionally leaked by computing devices. Most side-channel attack research has focused on electromagnetic emanations (TEMPEST), power consumption and, recently, diffuse visible light from CRT displays. The oldest eavesdropping channel, namely acoustic emanations, has received little attention. Our preliminary analysis of acoustic emanations from personal computers shows them to be a surprisingly rich source of information on CPU activity. This fact should be obvious to anyone who's ever tried to make low SNR recordings with a $5 sound card. |
|
|