DocumentCode
3023102
Title
Tempest in a Teapot: Compromising Reflections Revisited
Author
Backes, Michael ; Chen, Tongbo ; Duermuth, M. ; Lensch, Hendrik P A ; Welk, Martin
Author_Institution
Saarland Univ., Saarbrucken, Germany
fYear
2009
fDate
17-20 May 2009
Firstpage
315
Lastpage
327
Abstract
Reflecting objects such as tea pots and glasses, but also diffusely reflecting objects such as a user´s shirt, can be used to spy on confidential data displayed on a monitor. First, we show how reflections in the user´s eye can be exploited for spying on confidential data. Second, we investigate to what extent monitor images can be reconstructed from the diffuse reflections on a wall or the user´s clothes, and provide information-theoretic bounds limiting this type of attack. Third, we evaluate the effectiveness of several countermeasures. This substantially improves previous work (Backes et al., IEEE Symposium on Security & Privacy, 2008).
Keywords
reflection; security of data; confidential data; diffuse reflections; glasses; image reconstruction; information-theoretic bounds; reflecting objects; tea pots; Apertures; Computerized monitoring; Electromagnetic reflection; Focusing; Humans; Image reconstruction; Optical diffraction; Optical reflection; Optical sensors; Telescopes;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy, 2009 30th IEEE Symposium on
Conference_Location
Berkeley, CA
ISSN
1081-6011
Print_ISBN
978-0-7695-3633-0
Type
conf
DOI
10.1109/SP.2009.20
Filename
5207653
Link To Document