• DocumentCode
    3023102
  • Title

    Tempest in a Teapot: Compromising Reflections Revisited

  • Author

    Backes, Michael ; Chen, Tongbo ; Duermuth, M. ; Lensch, Hendrik P A ; Welk, Martin

  • Author_Institution
    Saarland Univ., Saarbrucken, Germany
  • fYear
    2009
  • fDate
    17-20 May 2009
  • Firstpage
    315
  • Lastpage
    327
  • Abstract
    Reflecting objects such as tea pots and glasses, but also diffusely reflecting objects such as a user´s shirt, can be used to spy on confidential data displayed on a monitor. First, we show how reflections in the user´s eye can be exploited for spying on confidential data. Second, we investigate to what extent monitor images can be reconstructed from the diffuse reflections on a wall or the user´s clothes, and provide information-theoretic bounds limiting this type of attack. Third, we evaluate the effectiveness of several countermeasures. This substantially improves previous work (Backes et al., IEEE Symposium on Security & Privacy, 2008).
  • Keywords
    reflection; security of data; confidential data; diffuse reflections; glasses; image reconstruction; information-theoretic bounds; reflecting objects; tea pots; Apertures; Computerized monitoring; Electromagnetic reflection; Focusing; Humans; Image reconstruction; Optical diffraction; Optical reflection; Optical sensors; Telescopes;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy, 2009 30th IEEE Symposium on
  • Conference_Location
    Berkeley, CA
  • ISSN
    1081-6011
  • Print_ISBN
    978-0-7695-3633-0
  • Type

    conf

  • DOI
    10.1109/SP.2009.20
  • Filename
    5207653