Knowledge

Computer security compromised by hardware failure

Source 📝

425:
word is present in the dictionary. The aim of the attack is to reconstruct the original word from the signal. This attack, taking as input a 10-minute sound recording of a user typing English text using a keyboard, and then recovering up to 96% of typed characters. This attack is inexpensive because the other hardware required is a parabolic microphone and non-invasive because it does not require physical intrusion into the system. The attack employs a neural network to recognize the key being pressed. It combines signal processing and efficient data structures and algorithms, to successfully reconstruct single words of 7-13 characters from a recording of the clicks made when typing them on a keyboard. The sound of clicks can differ slightly from key to key, because the keys are positioned at different positions on the keyboard plate, although the clicks of different keys sound similar to the human ear.
127:
of the video signal shows a remarkable resemblance to a broadcast TV signal. It is therefore possible to reconstruct the picture displayed on the video display unit from the radiated emission by means of a normal television receiver. If no preventive measures are taken, eavesdropping on a video display unit is possible at distances up to several hundreds of meters, using only a normal black-and-white TV receiver, a directional antenna and an antenna amplifier. It is even possible to pick up information from some types of video display units at a distance of over 1 kilometer. If more sophisticated receiving and decoding equipment is used, the maximum distance can be much greater.
570:
direction to the conventional current, producing voids at the negative electrode and hillocks and whiskers at the positive electrode. Void formation leads to a local increase in current density and Joule heating (the interaction of electrons and metal ions to produce thermal energy), producing further electromigration effects. When the external stress is removed, the disturbed system tends to relax back to its original equilibrium state, resulting in a backflow which heals some of the electromigration damage. In the long term though, this can cause device failure, but in less extreme cases it simply serves to alter a device's operating characteristics in noticeable ways.
429:
or more characters, and a success rate of 73% over all the words tested. In practice, a human attacker can typically determine if text is random. An attacker can also identify occasions when the user types user names and passwords. Short audio signals containing a single word, with seven or more characters long was considered. This means that the signal is only a few seconds long. Such short words are often chosen as a password. The dominant factors affecting the attack's success are the word length, and more importantly, the number of repeated characters within the word.
617:, which let him take the control of an Apple computer thanks to an iPod. The attacks needed a first generic phase where the iPod software was modified so that it behaves as master on the FireWire bus. Then the iPod had full read/write access on the Apple Computer when the iPod was plugged into a FireWire port. FireWire is used by : audio devices, printers, scanners, cameras, gps, etc. Generally, a device connected by FireWire has full access (read/write). Indeed, OHCI Standard (FireWire standard) reads : 148:
windows or similar forms of strong optical shielding. Most users, however, will not be aware of this risk and may not be willing to close the curtains on a nice day. The reflection of an object, a computer display, in a curved mirror creates a virtual image that is located behind the reflecting surface. For a flat mirror this virtual image has the same size and is located behind the mirror at the same distance as the original object. For curved mirrors, however, the situation is more complex.
3363: 3373: 218:
arranged in 24 columns and 8 rows. These columns are continuously pulsed one-by-one for at least 3μs. Thus, these leads may act as an antenna and generate electromagnetic emanations. If an attacker is able to capture these emanations, he can easily recover the column of the pressed key. Even if this signal does not fully describe the pressed key, it still gives partial information on the transmitted scan code, i.e. the column number.
736:
penalty has been already used to attack symmetric encryption algorithms, like DES. The basic idea proposed in this paper is to force a cache miss while the processor is executing the AES encryption algorithm on a known plain text. The attacks allow an unprivileged process to attack other process running in parallel on the same processor, despite partitioning methods such as memory protection, sandboxing and virtualization.
3383: 605:
processors typically store secret key material in static RAM, from which power is removed if the device is tampered with. At temperatures below −20 °C, the contents of SRAM can be ‘frozen’. It is interesting to know the period of time for which a static RAM device will retain data once the power has been removed. Low temperatures can increase the data retention time of SRAM to many seconds or even minutes.
544: 775:"; he explains that the processor defines four different privilege rings numbered from 0 (most privileged) to 3 (least privileged). Kernel code is usually running in ring 0, whereas user-space code is generally running in ring 3. The use of some security-critical assembly language instructions is restricted to ring 0 code. In order to escalate privilege through the backdoor, the attacker must : 22: 85:, while allowing the information and property to remain accessible and productive to its intended users. Such secret information could be retrieved by different ways. This article focus on the retrieval of data thanks to misused hardware or hardware failure. Hardware could be misused or exploited to get secret data. This article collects main types of attack that can lead to data theft. 209:
to a carrier of approximately 4 MHz which is very likely the internal clock of the micro-controller inside the keyboard. These harmonics are correlated with both clock and data signals, which describe modulated signals (in amplitude and frequency) and the full state of both clock and data signals. This means that the scan code can be completely recovered from these harmonics.
140:
This attack can be successfully mounted to spy on even small fonts using inexpensive, off-the-shelf equipment (less than 1500 dollars) from a distance of up to 10 meters. Relying on more expensive equipment allowed to conduct this attack from over 30 meters away, demonstrating that similar attacks are feasible from the other side of the street or from a close by building.
552:
type in SSH sessions. Because the time it takes the operating system to send out the packet after the keypress is in general negligible comparing to the interkeystroke timing, this also enables an eavesdropper to learn the precise interkeystroke timings of users’ typing from the arrival times of packets.
565:
Data remanence problems not only affect obvious areas such as RAM and non-volatile memory cells but can also occur in other areas of the device through hot-carrier effects (which change the characteristics of the semiconductors in the device) and various other effects which are examined alongside the
449:
Automatically recognizing the keys being pressed by a user is a hard problem that requires sophisticated motion analysis. Experiments show that, for a human, reconstructing a few sentences requires lengthy hours of slow-motion analysis of the video. The attacker might install a surveillance device in
441:
While extracting private information by watching somebody typing on a keyboard might seem to be an easy task, it becomes extremely challenging if it has to be automated. However, an automated tool is needed in the case of long-lasting surveillance procedures or long user activity, as a human being is
217:
Keyboard manufacturers arrange the keys in a matrix. The keyboard controller, often an 8-bit processor, parses columns one-by-one and recovers the state of 8 keys at once. This matrix scan process can be described as 192 keys (some keys may not be used, for instance modern keyboards use 104/105 keys)
208:
Harmonics compromising electromagnetic emissions come from unintentional emanations such as radiations emitted by the clock, non-linear elements, crosstalk, ground pollution, etc. Determining theoretically the reasons of these compromising radiations is a very complex task. These harmonics correspond
190:
When a key is pressed, released or held down, the keyboard sends a packet of information known as a scan code to the computer. The protocol used to transmit these scan codes is a bidirectional serial communication, based on four wires: Vcc (5 volts), ground, data and clock. Clock and data signals are
752:
keys, and break other cryptosystems. Against a vulnerable system, the attack is computationally inexpensive and often requires only known ciphertext. The attack can be treated as a signal detection problem. The signal consists of the timing variation due to the target exponent bit, and noise results
428:
On average, there were only 0.5 incorrect recognitions per 20 clicks, which shows the exposure of keyboard to the eavesdropping using this attack. The attack is very efficient, taking under 20 seconds per word on a standard PC. A 90% or better success rate of finding the correct word for words of 10
424:
PC keyboards, notebook keyboards are vulnerable to attacks based on differentiating the sound emanated by different keys. This attack takes as input an audio signal containing a recording of a single word typed by a single person on a keyboard, and a dictionary of words. It is assumed that the typed
199:
The Falling Edge Transition attack is limited to a partial recovery of the keystrokes. This is a significant limitation. The GTT is a falling edge transition attack improved, which recover almost all keystrokes. Indeed, between two traces, there is exactly one data rising edge. If attackers are able
147:
The reflections gathered from curved surfaces on close by objects indeed pose a substantial threat to the confidentiality of data displayed on the screen. Fully invalidating this threat without at the same time hiding the screen from the legitimate user seems difficult, without using curtains on the
143:
Many objects that may be found at a usual workplace can be exploited to retrieve information on a computer's display by an outsider. Particularly good results were obtained from reflections in a user's eyeglasses or a tea pot located on the desk next to the screen. Reflections that stem from the eye
126:
radiation, a code word for a U.S. government programme aimed at attacking the problem, the electromagnetic broadcast of data has been a significant concern in sensitive computer applications. Eavesdroppers can reconstruct video screen content from radio frequency emanations. Each (radiated) harmonic
457:
analyzes the video recorded by the camera using computer vision techniques. For each frame of the video, the computer vision analysis computes the set of keys that were likely pressed, the set of keys that were certainly not pressed, and the position of space characters. Because the results of this
135:
What is displayed by the monitor is reflected on the environment. The time-varying diffuse reflections of the light emitted by a CRT monitor can be exploited to recover the original monitor image. This is an eavesdropping technique for spying at a distance on data that is displayed on an arbitrary
767:
A simple and generic processor backdoor can be used by attackers as a means to privilege escalation to get to privileges equivalent to those of any given running operating system. Also, a non-privileged process of one of the non-privileged invited domain running on top of a virtual machine monitor
714: 704: 569:
Electromigration, which means to physically move the atom to new locations (to physically alter the device itself) is another type of attack. It involves the relocation of metal atoms due to high current densities, a phenomenon in which atoms are carried along by an "electron wind" in the opposite
551:
A very simple statistical techniques suffice to reveal sensitive information such as the length of users’ passwords or even root passwords. By using advanced statistical techniques on timing information collected from the network, the eavesdropper can learn significant information about what users
535:
is designed to provide a secure channel between two hosts. Despite the encryption and authentication mechanisms it uses, SSH has weaknesses. In interactive mode, every individual keystroke that a user types is sent to the remote machine in a separate IP packet immediately after the key is pressed,
221:
Note that the matrix scan routine loops continuously. When no key is pressed, we still have a signal composed of multiple equidistant peaks. These emanations may be used to remotely detect the presence of powered computers. Concerning wireless keyboards, the wireless data burst transmission can be
483:
With acoustic emanations, an attack that recovers what a dot-matrix printer processing English text is printing is possible. It is based on a record of the sound the printer makes, if the microphone is close enough to it. This attack recovers up to 72% of printed words, and up to 95% if knowledge
139:
The technique exploits reflections of the screen's optical emanations in various objects that one commonly finds close to the screen and uses those reflections to recover the original screen content. Such objects include eyeglasses, tea pots, spoons, plastic bottles, and even the eye of the user.
735:
Unfortunately caches contain only a small portion of the application data and can introduce additional latency to the memory transaction in the case of a miss. This involves also additional power consumption which is due to the activation of memory devices down in the memory hierarchy. The miss
724: 487:
After an upfront training phase ("a" in the picture below), the attack ("b" in the picture below) is fully automated and uses a combination of machine learning, audio processing, and speech recognition techniques, including spectrum features, Hidden Markov Models and linear classification. The
178:
keyboards. These emissions lead to a full or a partial recovery of the keystrokes. The best practical attack fully recovered 95% of the keystrokes of a PS/2 keyboard at a distance up to 20 meters, even through walls. Because each keyboard has a specific fingerprint based on the clock frequency
491:
A training phase was conducted where words from a dictionary are printed and characteristic sound features of these words are extracted and stored in a database. The trained characteristic features was used to recognize the printed English text. But, this task is not trivial. Major challenges
161:
Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. Electromagnetic emanations have turned out to constitute a
604:
Many products do cryptographic and other security-related computations using secret keys or other variables that the equipment's operator must not be able to read out or alter. The usual solution is for the secret data to be kept in volatile memory inside a tamper-sensing enclosure. Security
753:
from measurement inaccuracies and timing variations due to unknown exponent bits. The properties of the signal and noise determine the number of timing measurements required to for the attack. Timing attacks can potentially be used against other cryptosystems, including symmetric functions.
88:
Computer security can be comprised by devices, such as keyboards, monitors or printers (thanks to electromagnetic or acoustic emanation for example) or by components of the computer, such as the memory, the network card or the processor (thanks to time or temperature analysis for example).
432:
This is a procedure that makes it possible to efficiently uncover a word out of audio recordings of keyboard click sounds. More recently, extracting information out of another type of emanations was demonstrated: acoustic emanations from mechanical devices such as dot-matrix printers.
462:, called the text analysis, is required. The goal of this phase is to remove errors using both language and context-sensitive techniques. The result of this phase is the reconstructed text, where each word is represented by a list of possible candidates, ranked by likelihood. 308:, Martin Vuagnoux and Sylvain Pasini tested 12 different keyboard models, with PS/2, USB connectors and wireless communication in different setups: a semi-anechoic chamber, a small office, an adjacent office and a flat in a building. The table below presents their results. 450:
the room of the victim, might take control of an existing camera by exploiting a vulnerability in the camera's control software, or might simply point a mobile phone with an integrated camera at the laptop's keyboard when the victim is working in a public space.
573:
For example, the excavations of voids leads to increased wiring resistance and the growth of whiskers leads to contact formation and current leakage. An example of a conductor which exhibits whisker growth due to electromigration is shown in the figure below:
488:
fundamental reason why the reconstruction of the printed text works is that, the emitted sound becomes louder if more needles strike the paper at a given time. There is a correlation between the number of needles and the intensity of the acoustic emanation.
173:
The approach is to acquire the raw signal directly from the antenna and to process the entire captured electromagnetic spectrum. Thanks to this method, four different kinds of compromising electromagnetic emanations have been detected, generated by
144:
of the user also provide good results. However, eyes are harder to spy on at a distance because they are fast-moving objects and require high exposure times. Using more expensive equipment with lower exposure times helps to remedy this problem.
785:
get back to ring 3 in order to return the system to a stable state. Indeed, when code is running in ring 0, system calls do not work : Leaving the system in ring 0 and running a random system call (exit() typically) is likely to crash the
191:
identically generated. Hence, the compromising emanation detected is the combination of both signals. However, the edges of the data and the clock lines are not superposed. Thus, they can be easily separated to obtain independent signals.
790:
The backdoors Loïc Duflot presents are simple as they only modify the behavior of three assembly language instructions and have very simple and specific activation conditions, so that they are very unlikely to be accidentally activated.
420:
Attacks against emanations caused by human typing have attracted interest in recent years. In particular, works showed that keyboard acoustic emanations do leak information that can be exploited to reconstruct the typed text.
102:
The monitor is the main device used to access data on a computer. It has been shown that monitors radiate or reflect data on their environment, potentially giving attackers access to information displayed on the monitor.
685:
which decreases the memory access latency. Below, the figure shows the hierarchy between the processor and the memory. First the processor looks for data in the cache L1, then L2, then in the memory.
507: 621:
Physical requests, including physical read, physical write and lock requests to some CSR registers (section 5.5), are handled directly by the Host Controller without assistance by system software.
601:
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed from a motherboard.
566:
more obvious memory-cell remanence problems. It is possible to analyse and recover data from these cells and from semiconductor devices in general long after it should (in theory) have vanished.
166: 466: 589: 578: 689: 2090:; Clarkson, William; Paul, William; Calandrino, Joseph A.; Feldman, Ariel J.; Appelbaum, Jacob; Felten, Edward W. (2009). "Lest We Remember: Cold Boot Attacks on Encryption Keys". 696:
When the data is not where the processor is looking for, it is called a cache-miss. Below, pictures show how the processor fetch data when there are two cache levels.
32: 529:
Timing attacks enable an attacker to extract secrets maintained in a security system by observing the time it takes the system to respond to various queries.
2011: 222:
used as an electromagnetic trigger to detect exactly when a key is pressed, while the matrix scan emanations are used to determine the column it belongs to.
179:
inconsistencies, it can determine the source keyboard of a compromising emanation, even if multiple keyboards from the same model are used at the same time.
1928: 230:
Some techniques can only target some keyboards. This table sums up which technique could be used to find keystroke for different kind of keyboard.
43: 2356: 1897: 502:
Identifying and eliminating wrongly recognized words to increase the overall percentage of correctly identified words (recognition rate).
2034: 2399: 446:
presents a novel approach to automatically recovering the text being typed on a keyboard, based solely on a video of the user typing.
2192:. Lecture Notes in Computer Science. Vol. 1109. Santa Barbara, California, USA: Springer-Verlag, London, UK. pp. 104–113. 1536:. Lecture Notes in Computer Science. Vol. 3860. San Jose, California, USA: Springer-Verlag Berlin, Heidelberg. pp. 1–20. 81:
applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or
585:
One example which exhibits void formation (in this case severe enough to have led to complete failure) is shown in this figure:
3116: 3088: 162:
security threat to computer equipment. The figure below presents how a keystroke is retrieved and what material is necessary.
3141: 2324: 2215: 2112: 1980: 1873: 1805: 1734: 1646: 1559: 1516: 1482: 1437: 1380: 2992: 1672: 39: 744:
By carefully measuring the amount of time required to perform private key operations, attackers may be able to find fixed
3146: 2418: 2091: 2651: 547:
Network messages sent between the host and the client for the command 'su' – numbers are size of network packet in byte
499:
Compensating for the blurred and overlapping features that are induced by the substantial decay time of the emanations;
1707:
Kuhn, Markus G.; Anderson, Ross J. (1998). "Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations".
631:
So, any device connected by FireWire can read and write data on the computer memory. For example, a device can :
3298: 3126: 2656: 61: 3386: 2480: 2022: 2774: 745: 3065: 3027: 2684: 2392: 536:
which leaks the inter-keystroke timing information of users’ typing. Below, the picture represents the command
1455:
Berger, Yigael; Wool, Avishai; Yeredor, Arie (2006). "Dictionary attacks using keyboard acoustic emanations".
496:
Identifying and extracting sound features that suitably capture the acoustic emanation of dot-matrix printers;
3207: 3184: 2914: 2904: 2264:, vol. 12, no. 5, Washington, DC, USA: USENIX Association Berkeley, California, USA, p. 701, 2188:
Kocher, Paul C. (1996). "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems".
1623:. Vol. 1. Washington, DC, USA: IEEE Computer Society, Los Alamitos, California, USA. pp. 586–591. 3288: 2876: 2784: 2689: 2465: 2450: 2365: 1939: 3376: 3111: 2609: 1532:
Osvik, Dag Arne; Shamir, Adi; Tromer, Eran (2006). "Cache Attacks and Countermeasures: The Case of AES".
3407: 3348: 2997: 3366: 3293: 3268: 3131: 2779: 2385: 2183:, vol. 10, Washington, D.C., USA: USENIX Association Berkeley, California, USA, pp. 337–352 1913: 2245: 2157: 2002: 1629: 1612:
Bertoni, Guido; Zaccaria, Vittorio; Breveglieri, Luca; Monchiero, Matteo; Palermo, Gianluca (2005).
1589: 1420: 3217: 3050: 2636: 2505: 2307: 2270: 2198: 1824: 1758: 1717: 1542: 1500:
Backes, Michael; Dürmuth, Markus; Gerling, Sebastian; Pinkal, Manfred; Sporleder, Caroline (2010),
1465: 1363: 1856: 1788: 36:
that states a Knowledge editor's personal feelings or presents an original argument about a topic.
3278: 3212: 3103: 2919: 2579: 1501: 1414:. Vol. 13, no. 1. Alexandria, Virginia, USA: ACM New York, NY, USA. pp. 373–382. 3412: 3343: 3174: 3055: 2822: 2812: 2807: 2302: 2265: 2193: 2173: 1851: 1783: 1753: 1712: 1624: 1537: 1460: 1415: 1358: 1621:
International Conference on Information Technology: Coding and Computing (ITCC'05) – Volume II
3313: 3283: 3273: 3169: 3083: 2959: 2899: 2866: 2856: 2739: 2704: 2694: 2631: 2500: 2475: 2470: 2435: 2045: 182:
The four different kinds way of compromising electromagnetic emanations are described below.
1840: 3073: 3045: 3017: 3012: 2841: 2817: 2769: 2752: 2747: 2729: 2719: 2714: 2676: 2626: 2621: 2538: 2484: 8: 3338: 3263: 3179: 3164: 2929: 2709: 2666: 2661: 2558: 2548: 2520: 2254: 2064: 484:
about the text are done, with a microphone at a distance of 10 cm from the printer.
1457:
Proceedings of the 13th ACM conference on Computer and communications security – CCS '06
3303: 3202: 3078: 3035: 2944: 2886: 2871: 2861: 2646: 2445: 2350: 2338: 2233: 2221: 2145: 2126: 1990: 1891: 1879: 1811: 1682:, vol. 10, USENIX Association Berkeley, California, USA, p. 4, archived from 1652: 1613: 1577: 1488: 1394: 123: 1775: 1406:
Zhuang, Li; Zhou, Feng; Tygar, J.D. (2005). "Keyboard acoustic emanations revisited".
3323: 3253: 3232: 3194: 3002: 2969: 2949: 2641: 2553: 2427: 2330: 2320: 2211: 2118: 2108: 2075: 1976: 1869: 1801: 1767: 1730: 1642: 1565: 1555: 1512: 1478: 1443: 1433: 1386: 1376: 810: 762: 118:
broadband harmonics of the various 'random' digital signals such as the video signal.
78: 2225: 2012:"Using CPU System Management Mode to Circumvent Operating System Security Functions" 3156: 3040: 3007: 2802: 2724: 2613: 2599: 2594: 2543: 2530: 2455: 2408: 2342: 2312: 2275: 2203: 2130: 2100: 1968: 1883: 1861: 1815: 1793: 1763: 1722: 1656: 1634: 1547: 1492: 1470: 1425: 1368: 82: 1410:. Proceedings of the 12th ACM Conference on Computer and Communications Security. 1398: 3227: 3121: 3093: 2987: 2939: 2924: 2909: 2764: 2759: 2699: 2589: 2563: 2515: 2460: 2279: 1972: 749: 1865: 1797: 1683: 1372: 469:
Diagram presenting steps to go through when detecting keystroke with video input
3333: 3237: 3136: 2982: 2954: 2087: 2367:
Contribution à la sécurité des systèmes d'exploitation et des microprocesseurs
681:
To increase the computational power, processors are generally equipped with a
3401: 3222: 2510: 2334: 2134: 2122: 2079: 1963:
Duflot, Loïc (2008). "CPU Bugs, CPU Backdoors and Consequences on Security".
1745: 1726: 1569: 1447: 1390: 506: 2207: 2104: 1832:
In Proceedings of the 18th Conference on USENIX Security Symposium (SSYM'09)
1746:"Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" 1474: 1429: 165: 3318: 2977: 532: 768:
can get to privileges equivalent to those of the virtual machine monitor.
453:
Balzarotti's analysis is divided into two main phases (figure below). The
3308: 2934: 2846: 1825:"Compromising electromagnetic emanations of wired and wireless keyboards" 1638: 306:"Compromising Electromagnetic Emanations of Wired and Wireless Keyboards" 795:
have begun to target these types of processor-based escalation attacks.
3328: 3258: 2851: 2584: 2440: 2316: 2262:
Proceedings of the 12th Conference on USENIX Security Symposium SSYM'03
1967:. Lecture Notes in Computer Science. Vol. 5283. pp. 580–599. 1711:. Lecture Notes in Computer Science. Vol. 1525. pp. 124–142. 1680:
Proceedings of the 10th Conference on USENIX Security Symposium SSYM'01
1551: 1598: 1459:. Alexandria, Virginia, USA: ACM New York, NY, USA. pp. 245–254. 2833: 2794: 682: 1599:"Partitioned cache architecture as a side-channel defence mechanism" 713: 703: 647:
Parse the whole physical memory to understand logical memory layout.
465: 2894: 2377: 723: 543: 200:
to detect this transition, they can fully recover the keystrokes.
1614:"AES power attack based on induced cache miss and countermeasure" 588: 577: 136:
computer screen, including the currently prevalent LCD monitors.
1353:
Asonov, D.; Agrawal, R. (2004). "Keyboard acoustic emanations".
442:
able to reconstruct only a few characters per minute. The paper
2181:
Proceedings of the 10th Conference on USENIX Security Symposium
2072:
Technical Report - University of Cambridge. Computer Laboratory
1355:
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
2074:, Cambridge, UK: University of Cambridge Computer Laboratory, 779:
activate the backdoor by placing the CPU in the desired state;
169:
Diagram presenting all material necessary to detect keystrokes
2099:. Vol. 52. ACM New York, New York, USA. pp. 45–60. 510:
Diagram presenting phases when retrieving data from a printer
1408:
ACM Transactions on Information and System Security (TISSEC)
688: 638:
Just search the memory for strings such as login, passwords;
1839:
Backes, Michael; Dürmuth, Markus; Unruh, Dominique (2002).
33:
personal reflection, personal essay, or argumentative essay
2174:"Timing analysis of keystrokes and timing attacks on SSH" 2172:
Song, Dawn Xiaodong; Wagner, David; Tian, Xuqing (2001),
2042:
Proceedings of the IEEE Symposium on Security and Privacy
1841:"Optical time-domain eavesdropping risks of CRT displays" 1776:"Optical time-domain eavesdropping risks of CRT displays" 608: 185: 1848:
Proceedings 2002 IEEE Symposium on Security and Privacy
1780:
Proceedings 2002 IEEE Symposium on Security and Privacy
444:"ClearShot: Eavesdropping on Keyboard Input from Video" 194: 2093:
Lest we remember: Cold-boot attacks on encryption keys
2299:
2008 IEEE Symposium on Security and Privacy (sp 2008)
773:
CPU bugs, CPU backdoors and consequences on security
2293:Balzarotti, D.; Cova, M.; Vigna, G. (2008). "Clear 771:
Loïc Duflot studied Intel processors in the paper "
436: 115:narrowband harmonics of the digital clock signals; 1509:Proceedings of the 19th USENIX Security Symposium 1302: 1291: 1178: 1167: 1156: 75:Computer security compromised by hardware failure 3399: 1145: 2297:: Eavesdropping on Keyboard Input from Video". 920: 156: 2065:"Low temperature data remanence in static RAM" 1956: 1850:. Oakland, California, USA. pp. 158–169. 1107: 1096: 1085: 1074: 1063: 1047: 1025: 898: 887: 876: 865: 851: 613:Maximillian Dornseif presented a technique in 2417:Note: This template roughly follows the 2012 2393: 1752:, vol. 4, no. 4, pp. 269–286, 106: 212: 1929:"FireWire all your memory are belong to us" 1502:"Acoustic Side-Channel Attacks on Printers" 203: 130: 2400: 2386: 2355:: CS1 maint: location missing publisher ( 1896:: CS1 maint: location missing publisher ( 1823:Vuagnoux, Martin; Pasini, Sylvain (2009), 2306: 2269: 2197: 1855: 1787: 1757: 1716: 1673:"Data Remanence in Semiconductor Devices" 1628: 1541: 1464: 1419: 1362: 1318: 1316: 519: 62:Learn how and when to remove this message 1136: 1134: 1132: 1016: 1014: 1012: 1000: 998: 986: 984: 961: 959: 936: 934: 722: 712: 702: 687: 644:Search cryptographic keys stored in RAM; 587: 576: 542: 505: 478: 464: 164: 1412:ACM Transactions on Information Systems 1269: 1258: 1225: 1194: 1192: 756: 3400: 3117:Knowledge representation and reasoning 1744:Van Eck, Wim; Laborato, Neher (1985), 1327: 1313: 1280: 1236: 820: 818: 804: 609:Read/Write exploits thanks to FireWire 592:Void formation due to electromigration 581:Whisker growth due to electromigration 514: 415: 3142:Philosophy of artificial intelligence 2381: 2255:"Remote timing attacks are practical" 2086:Halderman, J. Alex; Schoen, Seth D.; 2044:, Oakland, California, archived from 1247: 1214: 1129: 1118: 1009: 995: 981: 970: 956: 945: 931: 560: 186:The Falling Edge Transition Technique 2461:Energy consumption (Green computing) 2407: 1203: 1189: 829: 661:Change UID/GID of a certain process; 540:processed through a SSH connection. 195:The Generalized Transition Technique 122:Known as compromising emanations or 15: 3147:Distributed artificial intelligence 2419:ACM Computing Classification System 2253:Brumley, David; Boneh, Dan (2003), 2190:Advances in Cryptology – CRYPTO '96 1054: 1052: 1050: 1038: 1036: 1034: 1032: 1030: 1028: 840: 815: 13: 2652:Integrated development environment 2021:, pp. 580–599, archived from 1700: 1534:Topics in Cryptology – CT-RSA 2006 911: 909: 907: 905: 903: 901: 856: 854: 739: 14: 3424: 3127:Automated planning and scheduling 2657:Software configuration management 2301:. Oakland, CA. pp. 170–183. 2165: 1525: 782:inject code and run it in ring 0; 458:phase of the analysis are noisy, 250:Falling Edge Transition Technique 3381: 3371: 3362: 3361: 2056: 2035:"Tamper Evident Microprocessors" 1965:Computer Security - ESORICS 2008 524: 263:Generalized Transition Technique 20: 3372: 2775:Computational complexity theory 1341: 676: 641:Scan for possible key material; 437:Video Eavesdropping on Keyboard 2559:Network performance evaluation 1927:Dornseif, Maximillian (2005), 1912:Dornseif, Maximillian (2004), 596: 1: 2930:Multimedia information system 2915:Geographic information system 2905:Enterprise information system 2494:Computer systems organization 2063:Skorobogatov, Sergei (2002), 798: 667:Inject an additional process. 111:Video display units radiate: 3289:Computational social science 2877:Theoretical computer science 2690:Software development process 2466:Electronic design automation 2451:Very Large Scale Integration 2280:10.1016/j.comnet.2005.01.010 1973:10.1007/978-3-540-88313-5_37 1768:10.1016/0167-4048(85)90046-X 671: 7: 3112:Natural language processing 2900:Information storage systems 1957:Processor bug and backdoors 1905: 1866:10.1109/SECPRI.2002.1004358 1798:10.1109/SECPRI.2002.1004358 1664: 1373:10.1109/SECPRI.2004.1301311 1346: 664:Inject code into a process; 151: 10: 3429: 3028:Human–computer interaction 2998:Intrusion detection system 2910:Social information systems 2895:Database management system 2363: 2292: 2252: 2187: 2171: 2085: 2032: 2009: 1962: 1926: 1911: 1838: 1822: 1773: 1706: 1611: 1499: 1333: 1322: 1308: 1297: 1275: 1264: 1253: 1231: 1184: 1173: 1162: 1151: 1140: 1124: 1020: 1004: 990: 976: 965: 951: 940: 926: 915: 893: 882: 871: 860: 835: 792: 772: 760: 614: 473: 305: 225: 157:Electromagnetic emanations 107:Electromagnetic emanations 97: 92: 3357: 3294:Computational engineering 3269:Computational mathematics 3246: 3193: 3155: 3102: 3064: 3026: 2968: 2885: 2831: 2793: 2738: 2675: 2608: 2572: 2529: 2493: 2426: 2415: 2062: 2019:Proceedings of CanSecWest 1743: 1670: 1606:Cryptology ePrint Archive 1596: 1531: 1454: 1405: 1352: 1286: 1242: 1220: 1209: 1198: 1113: 1102: 1091: 1080: 1069: 1058: 1042: 846: 824: 717:Data A is in the L2-Cache 707:Data A is in the L1-Cache 692:Processor cache hierarchy 635:Grab the screen contents; 555: 443: 317:Number of tested keyboard 213:The Matrix Scan Technique 3304:Computational healthcare 3299:Differentiable computing 3218:Graphics processing unit 2637:Domain-specific language 2506:Computational complexity 2286: 1774:Kuhn, Markus G. (2002). 1750:Computers & Security 1727:10.1007/3-540-49380-8_10 746:Diffie-Hellman exponents 204:The Modulation Technique 131:Compromising reflections 3279:Computational chemistry 3213:Photograph manipulation 3104:Artificial intelligence 2920:Decision support system 2208:10.1007/3-540-68697-5_9 2105:10.1145/1506409.1506429 1671:Gutmann, Peter (2001), 1475:10.1145/1180405.1180436 1430:10.1145/1609956.1609959 1243:Skorobogatov, 2002, p.3 727:Data A is in the memory 3344:Educational technology 3175:Reinforcement learning 2925:Process control system 2823:Computational geometry 2813:Algorithmic efficiency 2808:Analysis of algorithms 2456:Systems on Chip (SoCs) 2033:Waksman, Adam (2010), 728: 718: 708: 693: 658:Change screen content; 629: 593: 582: 548: 520:Network Interface Card 511: 470: 304:In their paper called 170: 42:by rewriting it in an 3314:Electronic publishing 3284:Computational biology 3274:Computational physics 3170:Unsupervised learning 3084:Distributed computing 2960:Information retrieval 2867:Mathematical analysis 2857:Mathematical software 2740:Theory of computation 2705:Software construction 2695:Requirements analysis 2573:Software organization 2501:Computer architecture 2471:Hardware acceleration 2436:Printed circuit board 2364:Duflot, Loïc (2007), 2010:Duflot, Loïc (2008), 1597:Page, Daniel (2005), 1141:Balzarotti, 2008, p.2 1125:Balzarotti, 2008, p.1 726: 716: 706: 691: 619: 591: 580: 546: 509: 468: 289:Matrix Scan Technique 168: 3074:Concurrent computing 3046:Ubiquitous computing 3018:Application security 3013:Information security 2842:Discrete mathematics 2818:Randomized algorithm 2770:Computability theory 2748:Model of computation 2720:Software maintenance 2715:Software engineering 2677:Software development 2627:Programming language 2622:Programming paradigm 2539:Network architecture 1639:10.1109/ITCC.2005.62 757:Privilege escalation 276:Modulation Technique 3349:Document management 3339:Operations research 3264:Enterprise software 3180:Multi-task learning 3165:Supervised learning 2887:Information systems 2710:Software deployment 2667:Software repository 2521:Real-time computing 1232:Halderman, 2008, p1 1210:Gutmann, 2001, p. 4 1199:Gutmann, 2001, p. 1 1021:Vuagnoux, 2009, p.9 1005:Vuagnoux, 2009, p.8 991:Vuagnoux, 2009, p.7 977:Vuagnoux, 2009, p.6 966:Vuagnoux, 2009, p.5 952:Vuagnoux, 2009, p.2 941:Vuagnoux, 2009, p.1 655:Mess up the memory; 515:Computer components 479:Acoustic emanations 416:Acoustic emanations 3132:Search methodology 3079:Parallel computing 3036:Interaction design 2945:Computing platform 2872:Numerical analysis 2862:Information theory 2647:Software framework 2610:Software notations 2549:Network components 2446:Integrated circuit 2317:10.1109/SP.2008.28 1914:"0wned by an iPod" 1709:Information Hiding 1552:10.1007/11605805_1 1511:, Washington, DC, 1276:Bertoni, 2005, p.3 1265:Bertoni, 2005, p.1 1221:Gutmann, 2001, p.5 1163:Brumley, 2003, p.1 894:Backes, 2008, p.11 729: 719: 709: 694: 594: 583: 561:Physical chemistry 549: 512: 471: 245:Wireless Keyboard 176:wired and wireless 171: 44:encyclopedic style 31:is written like a 3408:Computer security 3395: 3394: 3324:Electronic voting 3254:Quantum Computing 3247:Applied computing 3233:Image compression 3003:Hardware security 2993:Security services 2950:Digital marketing 2730:Open-source model 2642:Modeling language 2554:Network scheduler 2326:978-0-7695-3168-7 2242:|periodical= 2217:978-3-540-61512-5 2154:|periodical= 2114:978-1-931971-60-7 1999:|periodical= 1982:978-3-540-88312-8 1875:978-0-7695-3168-7 1807:978-0-7695-1543-4 1736:978-3-540-65386-8 1648:978-0-7695-2315-6 1586:|periodical= 1561:978-3-540-31033-4 1518:978-1-931971-77-5 1484:978-1-59593-518-2 1439:978-1-59593-226-6 1382:978-0-7695-2136-7 1357:. pp. 3–11. 1334:Duflot, 2008, p.5 1323:Duflot, 2008, p.1 1309:Kocher, 1996, p.9 1298:Kocher, 1996, p.1 1287:Shamir, 2005, p.1 1152:Backes, 2010, p.1 1114:Berger, 2006, p.8 1103:Zhuang, 2005, p.4 1092:Asonov, 2004, p.4 1081:Zhuang, 2005, p.1 1070:Berger, 2006, p.2 1059:Asonov, 2004, p.1 1043:Berger, 2006, p.1 927:Backes, 2008, p.3 916:Backes, 2008, p.2 883:Backes, 2008, p.4 872:Backes, 2008, p.1 861:Backes, 2010, p.4 811:Computer security 793:Recent inventions 763:Hardware backdoor 733: 732: 413: 412: 302: 301: 79:computer security 72: 71: 64: 3420: 3385: 3384: 3375: 3374: 3365: 3364: 3185:Cross-validation 3157:Machine learning 3041:Social computing 3008:Network security 2803:Algorithm design 2725:Programming team 2685:Control variable 2662:Software library 2600:Software quality 2595:Operating system 2544:Network protocol 2409:Computer science 2402: 2395: 2388: 2379: 2378: 2374: 2372: 2360: 2354: 2346: 2310: 2282: 2273: 2259: 2249: 2243: 2239: 2237: 2229: 2201: 2184: 2178: 2161: 2155: 2151: 2149: 2141: 2139: 2133:. Archived from 2098: 2082: 2069: 2052: 2050: 2039: 2029: 2027: 2016: 2006: 2000: 1996: 1994: 1986: 1952: 1951: 1950: 1944: 1938:, archived from 1933: 1923: 1918: 1901: 1895: 1887: 1859: 1845: 1835: 1829: 1819: 1791: 1770: 1761: 1740: 1720: 1696: 1695: 1694: 1688: 1677: 1660: 1632: 1618: 1608: 1603: 1593: 1587: 1583: 1581: 1573: 1545: 1521: 1506: 1496: 1468: 1451: 1423: 1402: 1366: 1336: 1331: 1325: 1320: 1311: 1306: 1300: 1295: 1289: 1284: 1278: 1273: 1267: 1262: 1256: 1251: 1245: 1240: 1234: 1229: 1223: 1218: 1212: 1207: 1201: 1196: 1187: 1182: 1176: 1171: 1165: 1160: 1154: 1149: 1143: 1138: 1127: 1122: 1116: 1111: 1105: 1100: 1094: 1089: 1083: 1078: 1072: 1067: 1061: 1056: 1045: 1040: 1023: 1018: 1007: 1002: 993: 988: 979: 974: 968: 963: 954: 949: 943: 938: 929: 924: 918: 913: 896: 891: 885: 880: 874: 869: 863: 858: 849: 844: 838: 833: 827: 822: 813: 808: 699: 698: 627: 314:Type of keyboard 311: 310: 233: 232: 83:natural disaster 67: 60: 56: 53: 47: 24: 23: 16: 3428: 3427: 3423: 3422: 3421: 3419: 3418: 3417: 3398: 3397: 3396: 3391: 3382: 3353: 3334:Word processing 3242: 3228:Virtual reality 3189: 3151: 3122:Computer vision 3098: 3094:Multiprocessing 3060: 3022: 2988:Security hacker 2964: 2940:Digital library 2881: 2832:Mathematics of 2827: 2789: 2765:Automata theory 2760:Formal language 2734: 2700:Software design 2671: 2604: 2590:Virtual machine 2568: 2564:Network service 2525: 2516:Embedded system 2489: 2422: 2411: 2406: 2370: 2348: 2347: 2327: 2289: 2257: 2241: 2240: 2231: 2230: 2218: 2176: 2168: 2153: 2152: 2143: 2142: 2137: 2115: 2096: 2088:Heninger, Nadia 2067: 2059: 2048: 2037: 2025: 2014: 1998: 1997: 1988: 1987: 1983: 1959: 1948: 1946: 1942: 1931: 1916: 1908: 1889: 1888: 1876: 1843: 1834:, pp. 1–16 1827: 1808: 1782:. pp. 3–. 1737: 1703: 1701:Electromagnetic 1692: 1690: 1686: 1675: 1667: 1649: 1630:10.1.1.452.3319 1616: 1601: 1585: 1584: 1575: 1574: 1562: 1528: 1519: 1504: 1485: 1440: 1421:10.1.1.117.5791 1383: 1349: 1344: 1339: 1332: 1328: 1321: 1314: 1307: 1303: 1296: 1292: 1285: 1281: 1274: 1270: 1263: 1259: 1252: 1248: 1241: 1237: 1230: 1226: 1219: 1215: 1208: 1204: 1197: 1190: 1185:Song, 2001, p.2 1183: 1179: 1174:Song, 2001, p.1 1172: 1168: 1161: 1157: 1150: 1146: 1139: 1130: 1123: 1119: 1112: 1108: 1101: 1097: 1090: 1086: 1079: 1075: 1068: 1064: 1057: 1048: 1041: 1026: 1019: 1010: 1003: 996: 989: 982: 975: 971: 964: 957: 950: 946: 939: 932: 925: 921: 914: 899: 892: 888: 881: 877: 870: 866: 859: 852: 845: 841: 834: 830: 823: 816: 809: 805: 801: 765: 759: 742: 679: 674: 628: 625: 611: 599: 563: 558: 527: 522: 517: 492:include : 481: 476: 439: 418: 242:Laptop Keyboard 228: 215: 206: 197: 188: 159: 154: 133: 109: 100: 95: 77:is a branch of 68: 57: 51: 48: 40:help improve it 37: 25: 21: 12: 11: 5: 3426: 3416: 3415: 3410: 3393: 3392: 3390: 3389: 3379: 3369: 3358: 3355: 3354: 3352: 3351: 3346: 3341: 3336: 3331: 3326: 3321: 3316: 3311: 3306: 3301: 3296: 3291: 3286: 3281: 3276: 3271: 3266: 3261: 3256: 3250: 3248: 3244: 3243: 3241: 3240: 3238:Solid modeling 3235: 3230: 3225: 3220: 3215: 3210: 3205: 3199: 3197: 3191: 3190: 3188: 3187: 3182: 3177: 3172: 3167: 3161: 3159: 3153: 3152: 3150: 3149: 3144: 3139: 3137:Control method 3134: 3129: 3124: 3119: 3114: 3108: 3106: 3100: 3099: 3097: 3096: 3091: 3089:Multithreading 3086: 3081: 3076: 3070: 3068: 3062: 3061: 3059: 3058: 3053: 3048: 3043: 3038: 3032: 3030: 3024: 3023: 3021: 3020: 3015: 3010: 3005: 3000: 2995: 2990: 2985: 2983:Formal methods 2980: 2974: 2972: 2966: 2965: 2963: 2962: 2957: 2955:World Wide Web 2952: 2947: 2942: 2937: 2932: 2927: 2922: 2917: 2912: 2907: 2902: 2897: 2891: 2889: 2883: 2882: 2880: 2879: 2874: 2869: 2864: 2859: 2854: 2849: 2844: 2838: 2836: 2829: 2828: 2826: 2825: 2820: 2815: 2810: 2805: 2799: 2797: 2791: 2790: 2788: 2787: 2782: 2777: 2772: 2767: 2762: 2757: 2756: 2755: 2744: 2742: 2736: 2735: 2733: 2732: 2727: 2722: 2717: 2712: 2707: 2702: 2697: 2692: 2687: 2681: 2679: 2673: 2672: 2670: 2669: 2664: 2659: 2654: 2649: 2644: 2639: 2634: 2629: 2624: 2618: 2616: 2606: 2605: 2603: 2602: 2597: 2592: 2587: 2582: 2576: 2574: 2570: 2569: 2567: 2566: 2561: 2556: 2551: 2546: 2541: 2535: 2533: 2527: 2526: 2524: 2523: 2518: 2513: 2508: 2503: 2497: 2495: 2491: 2490: 2488: 2487: 2478: 2473: 2468: 2463: 2458: 2453: 2448: 2443: 2438: 2432: 2430: 2424: 2423: 2416: 2413: 2412: 2405: 2404: 2397: 2390: 2382: 2376: 2375: 2361: 2325: 2308:10.1.1.219.239 2288: 2285: 2284: 2283: 2271:10.1.1.12.2615 2250: 2216: 2199:10.1.1.40.5024 2185: 2167: 2166:Timing attacks 2164: 2163: 2162: 2140:on 2011-09-04. 2113: 2083: 2058: 2055: 2054: 2053: 2030: 2007: 1981: 1958: 1955: 1954: 1953: 1924: 1907: 1904: 1903: 1902: 1874: 1836: 1820: 1806: 1771: 1759:10.1.1.35.1695 1741: 1735: 1718:10.1.1.64.6982 1702: 1699: 1698: 1697: 1666: 1663: 1662: 1661: 1647: 1609: 1594: 1560: 1543:10.1.1.60.1857 1527: 1524: 1523: 1522: 1517: 1497: 1483: 1466:10.1.1.99.8028 1452: 1438: 1403: 1381: 1364:10.1.1.89.8231 1348: 1345: 1343: 1340: 1338: 1337: 1326: 1312: 1301: 1290: 1279: 1268: 1257: 1254:Dornseif, 2004 1246: 1235: 1224: 1213: 1202: 1188: 1177: 1166: 1155: 1144: 1128: 1117: 1106: 1095: 1084: 1073: 1062: 1046: 1024: 1008: 994: 980: 969: 955: 944: 930: 919: 897: 886: 875: 864: 850: 847:Eck, 1985, p.3 839: 836:Kuhn,1998, p.1 828: 825:Eck, 1985, p.2 814: 802: 800: 797: 788: 787: 783: 780: 758: 755: 741: 738: 731: 730: 720: 710: 678: 675: 673: 670: 669: 668: 665: 662: 659: 656: 649: 648: 645: 642: 639: 636: 623: 610: 607: 598: 595: 562: 559: 557: 554: 526: 523: 521: 518: 516: 513: 504: 503: 500: 497: 480: 477: 475: 472: 460:a second phase 438: 435: 417: 414: 411: 410: 407: 404: 401: 398: 395: 391: 390: 387: 384: 381: 378: 375: 371: 370: 367: 364: 361: 358: 355: 351: 350: 347: 344: 341: 338: 335: 331: 330: 327: 324: 321: 318: 315: 300: 299: 296: 293: 290: 286: 285: 283: 280: 277: 273: 272: 270: 267: 264: 260: 259: 257: 254: 251: 247: 246: 243: 240: 239:Wired Keyboard 237: 236:Technique name 227: 224: 214: 211: 205: 202: 196: 193: 187: 184: 158: 155: 153: 150: 132: 129: 120: 119: 116: 108: 105: 99: 96: 94: 91: 70: 69: 28: 26: 19: 9: 6: 4: 3: 2: 3425: 3414: 3413:Risk analysis 3411: 3409: 3406: 3405: 3403: 3388: 3380: 3378: 3370: 3368: 3360: 3359: 3356: 3350: 3347: 3345: 3342: 3340: 3337: 3335: 3332: 3330: 3327: 3325: 3322: 3320: 3317: 3315: 3312: 3310: 3307: 3305: 3302: 3300: 3297: 3295: 3292: 3290: 3287: 3285: 3282: 3280: 3277: 3275: 3272: 3270: 3267: 3265: 3262: 3260: 3257: 3255: 3252: 3251: 3249: 3245: 3239: 3236: 3234: 3231: 3229: 3226: 3224: 3223:Mixed reality 3221: 3219: 3216: 3214: 3211: 3209: 3206: 3204: 3201: 3200: 3198: 3196: 3192: 3186: 3183: 3181: 3178: 3176: 3173: 3171: 3168: 3166: 3163: 3162: 3160: 3158: 3154: 3148: 3145: 3143: 3140: 3138: 3135: 3133: 3130: 3128: 3125: 3123: 3120: 3118: 3115: 3113: 3110: 3109: 3107: 3105: 3101: 3095: 3092: 3090: 3087: 3085: 3082: 3080: 3077: 3075: 3072: 3071: 3069: 3067: 3063: 3057: 3056:Accessibility 3054: 3052: 3051:Visualization 3049: 3047: 3044: 3042: 3039: 3037: 3034: 3033: 3031: 3029: 3025: 3019: 3016: 3014: 3011: 3009: 3006: 3004: 3001: 2999: 2996: 2994: 2991: 2989: 2986: 2984: 2981: 2979: 2976: 2975: 2973: 2971: 2967: 2961: 2958: 2956: 2953: 2951: 2948: 2946: 2943: 2941: 2938: 2936: 2933: 2931: 2928: 2926: 2923: 2921: 2918: 2916: 2913: 2911: 2908: 2906: 2903: 2901: 2898: 2896: 2893: 2892: 2890: 2888: 2884: 2878: 2875: 2873: 2870: 2868: 2865: 2863: 2860: 2858: 2855: 2853: 2850: 2848: 2845: 2843: 2840: 2839: 2837: 2835: 2830: 2824: 2821: 2819: 2816: 2814: 2811: 2809: 2806: 2804: 2801: 2800: 2798: 2796: 2792: 2786: 2783: 2781: 2778: 2776: 2773: 2771: 2768: 2766: 2763: 2761: 2758: 2754: 2751: 2750: 2749: 2746: 2745: 2743: 2741: 2737: 2731: 2728: 2726: 2723: 2721: 2718: 2716: 2713: 2711: 2708: 2706: 2703: 2701: 2698: 2696: 2693: 2691: 2688: 2686: 2683: 2682: 2680: 2678: 2674: 2668: 2665: 2663: 2660: 2658: 2655: 2653: 2650: 2648: 2645: 2643: 2640: 2638: 2635: 2633: 2630: 2628: 2625: 2623: 2620: 2619: 2617: 2615: 2611: 2607: 2601: 2598: 2596: 2593: 2591: 2588: 2586: 2583: 2581: 2578: 2577: 2575: 2571: 2565: 2562: 2560: 2557: 2555: 2552: 2550: 2547: 2545: 2542: 2540: 2537: 2536: 2534: 2532: 2528: 2522: 2519: 2517: 2514: 2512: 2511:Dependability 2509: 2507: 2504: 2502: 2499: 2498: 2496: 2492: 2486: 2482: 2479: 2477: 2474: 2472: 2469: 2467: 2464: 2462: 2459: 2457: 2454: 2452: 2449: 2447: 2444: 2442: 2439: 2437: 2434: 2433: 2431: 2429: 2425: 2420: 2414: 2410: 2403: 2398: 2396: 2391: 2389: 2384: 2383: 2380: 2369: 2368: 2362: 2358: 2352: 2344: 2340: 2336: 2332: 2328: 2322: 2318: 2314: 2309: 2304: 2300: 2296: 2291: 2290: 2281: 2277: 2272: 2267: 2263: 2256: 2251: 2247: 2235: 2227: 2223: 2219: 2213: 2209: 2205: 2200: 2195: 2191: 2186: 2182: 2175: 2170: 2169: 2159: 2147: 2136: 2132: 2128: 2124: 2120: 2116: 2110: 2106: 2102: 2095: 2094: 2089: 2084: 2081: 2077: 2073: 2066: 2061: 2060: 2051:on 2013-09-21 2047: 2043: 2036: 2031: 2028:on 2006-05-26 2024: 2020: 2013: 2008: 2004: 1992: 1984: 1978: 1974: 1970: 1966: 1961: 1960: 1945:on 2009-12-29 1941: 1937: 1930: 1925: 1922: 1915: 1910: 1909: 1899: 1893: 1885: 1881: 1877: 1871: 1867: 1863: 1858: 1857:10.1.1.7.5870 1853: 1849: 1842: 1837: 1833: 1826: 1821: 1817: 1813: 1809: 1803: 1799: 1795: 1790: 1789:10.1.1.7.5870 1785: 1781: 1777: 1772: 1769: 1765: 1760: 1755: 1751: 1747: 1742: 1738: 1732: 1728: 1724: 1719: 1714: 1710: 1705: 1704: 1689:on 2007-02-21 1685: 1681: 1674: 1669: 1668: 1658: 1654: 1650: 1644: 1640: 1636: 1631: 1626: 1622: 1615: 1610: 1607: 1600: 1595: 1591: 1579: 1571: 1567: 1563: 1557: 1553: 1549: 1544: 1539: 1535: 1530: 1529: 1520: 1514: 1510: 1503: 1498: 1494: 1490: 1486: 1480: 1476: 1472: 1467: 1462: 1458: 1453: 1449: 1445: 1441: 1435: 1431: 1427: 1422: 1417: 1413: 1409: 1404: 1400: 1396: 1392: 1388: 1384: 1378: 1374: 1370: 1365: 1360: 1356: 1351: 1350: 1335: 1330: 1324: 1319: 1317: 1310: 1305: 1299: 1294: 1288: 1283: 1277: 1272: 1266: 1261: 1255: 1250: 1244: 1239: 1233: 1228: 1222: 1217: 1211: 1206: 1200: 1195: 1193: 1186: 1181: 1175: 1170: 1164: 1159: 1153: 1148: 1142: 1137: 1135: 1133: 1126: 1121: 1115: 1110: 1104: 1099: 1093: 1088: 1082: 1077: 1071: 1066: 1060: 1055: 1053: 1051: 1044: 1039: 1037: 1035: 1033: 1031: 1029: 1022: 1017: 1015: 1013: 1006: 1001: 999: 992: 987: 985: 978: 973: 967: 962: 960: 953: 948: 942: 937: 935: 928: 923: 917: 912: 910: 908: 906: 904: 902: 895: 890: 884: 879: 873: 868: 862: 857: 855: 848: 843: 837: 832: 826: 821: 819: 812: 807: 803: 796: 794: 784: 781: 778: 777: 776: 774: 769: 764: 754: 751: 747: 740:Timing attack 737: 725: 721: 715: 711: 705: 701: 700: 697: 690: 686: 684: 666: 663: 660: 657: 654: 653: 652: 646: 643: 640: 637: 634: 633: 632: 626:OHCI Standard 622: 618: 616: 606: 602: 590: 586: 579: 575: 571: 567: 553: 545: 541: 539: 534: 530: 525:Timing attack 508: 501: 498: 495: 494: 493: 489: 485: 467: 463: 461: 456: 451: 447: 445: 434: 430: 426: 422: 408: 405: 402: 399: 396: 393: 392: 388: 385: 382: 379: 376: 373: 372: 368: 365: 362: 359: 356: 353: 352: 348: 345: 342: 339: 336: 333: 332: 328: 325: 322: 319: 316: 313: 312: 309: 307: 297: 294: 291: 288: 287: 284: 281: 278: 275: 274: 271: 268: 265: 262: 261: 258: 255: 252: 249: 248: 244: 241: 238: 235: 234: 231: 223: 219: 210: 201: 192: 183: 180: 177: 167: 163: 149: 145: 141: 137: 128: 125: 117: 114: 113: 112: 104: 90: 86: 84: 80: 76: 66: 63: 55: 45: 41: 35: 34: 29:This article 27: 18: 17: 3319:Cyberwarfare 2978:Cryptography 2366: 2298: 2294: 2261: 2189: 2180: 2135:the original 2092: 2071: 2046:the original 2041: 2023:the original 2018: 1964: 1947:, retrieved 1940:the original 1935: 1920: 1847: 1831: 1779: 1749: 1708: 1691:, retrieved 1684:the original 1679: 1620: 1605: 1533: 1526:Cache attack 1508: 1456: 1411: 1407: 1354: 1342:Bibliography 1329: 1304: 1293: 1282: 1271: 1260: 1249: 1238: 1227: 1216: 1205: 1180: 1169: 1158: 1147: 1120: 1109: 1098: 1087: 1076: 1065: 972: 947: 922: 889: 878: 867: 842: 831: 806: 789: 770: 766: 743: 734: 695: 683:cache memory 680: 677:Cache attack 650: 630: 620: 615:these slides 612: 603: 600: 584: 572: 568: 564: 550: 537: 531: 528: 490: 486: 482: 459: 454: 452: 448: 440: 431: 427: 423: 419: 303: 229: 220: 216: 207: 198: 189: 181: 175: 172: 160: 146: 142: 138: 134: 121: 110: 101: 87: 74: 73: 58: 49: 30: 3329:Video games 3309:Digital art 3066:Concurrency 2935:Data mining 2847:Probability 2580:Interpreter 2373:(in French) 2057:Temperature 597:Temperature 455:first phase 3402:Categories 3387:Glossaries 3259:E-commerce 2852:Statistics 2795:Algorithms 2753:Stochastic 2585:Middleware 2441:Peripheral 1949:2010-12-17 1936:CanSecWest 1693:2010-12-13 799:References 761:See also: 3208:Rendering 3203:Animation 2834:computing 2785:Semantics 2476:Processor 2351:cite book 2335:1081-6011 2303:CiteSeerX 2266:CiteSeerX 2244:ignored ( 2234:cite book 2194:CiteSeerX 2156:ignored ( 2146:cite book 2123:0001-0782 2080:1476-2986 2001:ignored ( 1991:cite book 1892:cite book 1852:CiteSeerX 1784:CiteSeerX 1754:CiteSeerX 1713:CiteSeerX 1625:CiteSeerX 1588:ignored ( 1578:cite book 1570:0302-9743 1538:CiteSeerX 1461:CiteSeerX 1448:1094-9224 1416:CiteSeerX 1391:1081-6011 1359:CiteSeerX 748:, factor 672:Processor 3367:Category 3195:Graphics 2970:Security 2632:Compiler 2531:Networks 2428:Hardware 2226:15475583 1906:FireWire 1665:Chemical 1347:Acoustic 624:—  394:Wireless 152:Keyboard 52:May 2011 3377:Outline 2343:1498613 2131:7770695 1884:2385507 1816:2385507 1657:9364961 1493:2596394 786:system. 474:Printer 226:Summary 124:TEMPEST 98:Monitor 93:Devices 38:Please 2341:  2333:  2323:  2305:  2268:  2224:  2214:  2196:  2129:  2121:  2111:  2078:  1979:  1921:PacSec 1882:  1872:  1854:  1814:  1804:  1786:  1756:  1733:  1715:  1655:  1645:  1627:  1568:  1558:  1540:  1515:  1491:  1481:  1463:  1446:  1436:  1418:  1399:216795 1397:  1389:  1379:  1361:  556:Memory 374:Laptop 2780:Logic 2614:tools 2371:(PDF) 2339:S2CID 2287:Other 2258:(PDF) 2222:S2CID 2177:(PDF) 2138:(PDF) 2127:S2CID 2097:(PDF) 2068:(PDF) 2049:(PDF) 2038:(PDF) 2026:(PDF) 2015:(PDF) 1943:(PDF) 1932:(PDF) 1917:(PDF) 1880:S2CID 1844:(PDF) 1828:(PDF) 1812:S2CID 1687:(PDF) 1676:(PDF) 1653:S2CID 1617:(PDF) 1602:(PDF) 1505:(PDF) 1489:S2CID 1395:S2CID 2612:and 2485:Form 2481:Size 2357:link 2331:ISSN 2321:ISBN 2295:Shot 2246:help 2212:ISBN 2158:help 2119:ISSN 2109:ISBN 2076:ISSN 2003:help 1977:ISBN 1898:link 1870:ISBN 1802:ISBN 1731:ISBN 1643:ISBN 1590:help 1566:ISSN 1556:ISBN 1513:ISBN 1479:ISBN 1444:ISSN 1434:ISBN 1387:ISSN 1377:ISBN 409:1/1 389:2/2 369:2/2 349:5/7 334:PS/2 329:MST 320:FETT 298:Yes 2313:doi 2276:doi 2204:doi 2101:doi 1969:doi 1862:doi 1794:doi 1764:doi 1723:doi 1635:doi 1548:doi 1471:doi 1426:doi 1369:doi 750:RSA 651:or 533:SSH 406:0/1 403:0/1 400:0/1 386:0/2 383:1/2 380:1/2 366:0/2 363:0/2 360:0/2 354:USB 346:4/7 343:6/7 340:7/7 323:GTT 295:Yes 292:Yes 282:Yes 279:Yes 269:Yes 266:Yes 256:Yes 253:Yes 3404:: 2483:/ 2353:}} 2349:{{ 2337:. 2329:. 2319:. 2311:. 2274:, 2260:, 2238:: 2236:}} 2232:{{ 2220:. 2210:. 2202:. 2179:, 2150:: 2148:}} 2144:{{ 2125:. 2117:. 2107:. 2070:, 2040:, 2017:, 1995:: 1993:}} 1989:{{ 1975:. 1934:, 1919:, 1894:}} 1890:{{ 1878:. 1868:. 1860:. 1846:. 1830:, 1810:. 1800:. 1792:. 1778:. 1762:, 1748:, 1729:. 1721:. 1678:, 1651:. 1641:. 1633:. 1619:. 1604:, 1582:: 1580:}} 1576:{{ 1564:. 1554:. 1546:. 1507:, 1487:. 1477:. 1469:. 1442:. 1432:. 1424:. 1393:. 1385:. 1375:. 1367:. 1315:^ 1191:^ 1131:^ 1049:^ 1027:^ 1011:^ 997:^ 983:^ 958:^ 933:^ 900:^ 853:^ 817:^ 538:su 326:MT 2421:. 2401:e 2394:t 2387:v 2359:) 2345:. 2315:: 2278:: 2248:) 2228:. 2206:: 2160:) 2103:: 2005:) 1985:. 1971:: 1900:) 1886:. 1864:: 1818:. 1796:: 1766:: 1739:. 1725:: 1659:. 1637:: 1592:) 1572:. 1550:: 1495:. 1473:: 1450:. 1428:: 1401:. 1371:: 397:1 377:2 357:2 337:7 65:) 59:( 54:) 50:( 46:.

Index

personal reflection, personal essay, or argumentative essay
help improve it
encyclopedic style
Learn how and when to remove this message
computer security
natural disaster
TEMPEST

"Compromising Electromagnetic Emanations of Wired and Wireless Keyboards"
"ClearShot: Eavesdropping on Keyboard Input from Video"


SSH



these slides
cache memory




Diffie-Hellman exponents
RSA
Hardware backdoor
CPU bugs, CPU backdoors and consequences on security
Recent inventions
Computer security

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.