Computer security compromised by hardware failure: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Alter: title. Add: date. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | #UCB_CommandLine
m simplify wording
Line 21:
What is displayed by the monitor is reflected on the environment. The time-varying diffuse reflections of the light emitted by a CRT monitor can be exploited to recover the original monitor image.<ref name="[Back1]">[[#Back1|Backes, 2010, p.4]]</ref> This is an eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors.
 
The technique exploits reflections of the screen's optical emanations in various objects that one commonly finds in close proximity to the screen and uses those reflections to recover the original screen content. Such objects include eyeglasses, tea pots, spoons, plastic bottles, and even the eye of the user. This attack can be successfully mounted to spy on even small fonts using inexpensive, off-the-shelf equipment (less than 1500 dollars) from a distance of up to 10 meters. Relying on more expensive equipment allowed to conduct this attack from over 30 meters away, demonstrating that similar attacks are feasible from the other side of the street or from a close by building.<ref name="[Back3]">[[#Back2|Backes, 2008, p.1]]</ref>
 
Many objects that may be found at a usual workplace can be exploited to retrieve information on a computer's display by an outsider.<ref name="[Back4]">[[#Back2|Backes, 2008, p.4]]</ref> Particularly good results were obtained from reflections in a user's eyeglasses or a tea pot located on the desk next to the screen. Reflections that stem from the eye of the user also provide good results. However, eyes are harder to spy on at a distance because they are fast-moving objects and require high exposure times. Using more expensive equipment with lower exposure times helps to remedy this problem.<ref name="[Back5]">[[#Back2|Backes, 2008, p.11]]</ref>