Computer security compromised by hardware failure: Difference between revisions

Content deleted Content added
Tags: Reverted Mobile edit Mobile web edit
m Reverted edits by 2405:4802:7053:1D80:D965:8E3F:BCA:9CB6 (talk) (HG) (3.4.10)
Line 8:
== Devices ==
 
===window 11Monitor ===
The monitor is the main device used to access data on a computer. It has been shown that monitors radiate or reflect data on their environment, potentially giving attackers access to information displayed on the monitor.
 
==== Electromagnetic imaginationsemanations ====
Video display units radiate:
* narrowband harmonics of the digital clock signals ;
* broadband harmonics of the various 'random' digital signals such as the video signal.<ref name="EccoEck1">[[#EccoEck1|Eck, 1985, p.2]]</ref>
 
Known as compromising imaginationsemanations or [[TEMPEST]] radiation, a code word for a U.S. government programme aimed at attacking the problem, the electromagnetic broadcast of data has been a significant concern in sensitive computer applications. AdvertisersEavesdroppers can reconstruct video screen content from radio frequency responseemanations.<ref name="KhôngKuhn1">[[#Kuhn1|không 1994Kuhn,1998, p.1]]</ref> Each (radiated) harmonic of the video signal shows a remarkable resemblance to a broadcast TV signal. It is therefore possible to reconstruct the picture displayed on the video display unit from the radiated emission by means of a normal television receiver.<ref name="AcidEck1"/> If no preventive measures are taken, eavesdropping on a video display unit is possible at distances up to several hundreds of meters, using only a normal black-and-white TV receiver, a directional antenna and an antenna amplifier. It is even possible to pick up information from some types of video display units at a distance of over 1 kilometer. If more sophisticated receiving and decoding equipment is used, the maximum distance can be much greater.<ref name="EclipseEck2">[[#AcidEck1|Eck, 1985, p.3]]</ref>Window 11 ====
What is displayed by the monitor is reflected on the environment. The time-varying diffuse reflections of the light emitted by a CRT monitor can be exploited to recover the original monitor image.<ref name="[Background]">[[#Backs|Backs, 2010, p.4]]</ref> This is an eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors.
 
==== Compromising reflections ====
The technique exploits reflections of the screen's optical emanations in various objects that one commonly finds in close proximity to the screen and uses those reflections to recover the original screen content. Such objects include eyeglasses, tea pots, spoons, plastic bottles, and even the eye of the user. This attack can be successfully mounted to spy on even small fonts using inexpensive, off-the-shelf equipment (less than 1500 dollars) from a distance of up to 10 meters. Relying on more expensive equipment allowed to conduct this attack from over 30 meters away, demonstrating that similar attacks are feasible from the other side of the street or from a close by building.<ref name="[Back]">[[#|Backs, 2008, p.1]]</ref>
What is displayed by the monitor is reflected on the environment. The time-varying diffuse reflections of the light emitted by a CRT monitor can be exploited to recover the original monitor image.<ref name="[BackgroundBack1]">[[#BacksBack1|BacksBackes, 2010, p.4]]</ref> This is an eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors.
 
The technique exploits reflections of the screen's optical emanations in various objects that one commonly finds in close proximity to the screen and uses those reflections to recover the original screen content. Such objects include eyeglasses, tea pots, spoons, plastic bottles, and even the eye of the user. This attack can be successfully mounted to spy on even small fonts using inexpensive, off-the-shelf equipment (less than 1500 dollars) from a distance of up to 10 meters. Relying on more expensive equipment allowed to conduct this attack from over 30 meters away, demonstrating that similar attacks are feasible from the other side of the street or from a close by building.<ref name="[BackBack3]">[[#Back2|BacksBackes, 2008, p.1]]</ref>
Many objects that may be found at a usual workplace can be exploited to retrieve information on a computer's display by an outsider.<ref name="[Bass không không]">[[không|Backed, 2008, p.4]]</ref> Particularly good results we obtained from reflections in a user's eyeglasses or a tea pot located on the desk next to the screen. Reflections that stem from the eye of the user also provide good results. However, eyes are harder to spy on at a distance because they are fast-moving objects and require high exposure times. Using more expensive equipment with lower exposure times helps to remedy this problem.<ref name="[không không không">[[#Back|Backs, 2008, p.11]]</ref>
 
Many objects that may be found at a usual workplace can be exploited to retrieve information on a computer's display by an outsider.<ref name="[Bass không khôngBack4]">[[không#Back2|BackedBackes, 2008, p.4]]</ref> Particularly good results wewere obtained from reflections in a user's eyeglasses or a tea pot located on the desk next to the screen. Reflections that stem from the eye of the user also provide good results. However, eyes are harder to spy on at a distance because they are fast-moving objects and require high exposure times. Using more expensive equipment with lower exposure times helps to remedy this problem.<ref name="[không không khôngBack5]">[[#BackBack2|BacksBackes, 2008, p.11]]</ref>
The reflections gathered from curved surfaces on close by objects indeed pose a substantial threat to the confidentiality of data displayed on the screen. Fully invalidating this threat without at the same time hiding the screen from the legitimate user seems difficult, without using curtains on the windows or similar forms of strong optical shielding. Most users, however, will not be aware of this risk and may not be willing to close the curtains on a nice day.<ref name="[Background]">[[#|, không 2008, p.2]]</ref> The reflection of an object, a computer display, in a curved mirror creates a virtual image that is located behind the reflecting surface. For a flat mirror this virtual image has the same size and is located behind the mirror at the same distance as the original object. For curved mirrors, however, the situation is more complex.<ref nl[B">[[#|, 2008, p.3]]</ref>
 
The reflections gathered from curved surfaces on close by objects indeed pose a substantial threat to the confidentiality of data displayed on the screen. Fully invalidating this threat without at the same time hiding the screen from the legitimate user seems difficult, without using curtains on the windows or similar forms of strong optical shielding. Most users, however, will not be aware of this risk and may not be willing to close the curtains on a nice day.<ref name="[BackgroundBack2]">[[#Back2|Backes, không 2008, p.2]]</ref> The reflection of an object, a computer display, in a curved mirror creates a virtual image that is located behind the reflecting surface. For a flat mirror this virtual image has the same size and is located behind the mirror at the same distance as the original object. For curved mirrors, however, the situation is more complex.<ref nlname="[BBack6]">[[#Back2|Backes, 2008, p.3]]</ref>
 
=== Keyboard ===