Title of article :
Screen reading: Electromagnetic information leakage from the computer monitor
Author/Authors :
Grdović ، Milena M. Centre for Applied Mathematics and Electronics - Telecommunications and Information Security Directorate (J-6) - Serbian Armed Forces, General Staff , Protić ، Danijela D. Centre for Applied Mathematics and Electronics - Telecommunications and Information Security Directorate (J-6) - Serbian Armed Forces, General Staff , Antić ، Vladimir D. Centre for Applied Mathematics and Electronics - Telecommunications and Information Security Directorate (J-6) - Serbian Armed Forces, General Staff , Jovanović ، Boriša Ž. Centre for Applied Mathematics and Electronics - Telecommunications and Information Security Directorate (J-6) - Serbian Armed Forces, General Staff
From page :
836
To page :
855
Abstract :
Introduction/purpose: The security of systems can be jeopardized by compromising emanations. This paper provides an overview of computer screen attacks. New technologies can be used to exfiltrate sensitive data from computer screens. Emission security is the prevention of electromagnetic signal attacks that are conducted or radiated. Methods: This paper examines the impact of a side-channel attack that intercepts compromised information from a computer screen. The leakage of electromagnetic data is also explained. Software-defined radios are described to explain malicious attacks on computer monitors. Results: The source of the electromagnetic signal determines the nature of the side-channel information they carry. The most well-known issue associated with revealing emissions is the possibility of intercepting visual information displayed on computer monitors. Conclusion: Visual data displayed on computer monitors could be intercepted by a software-defined radio which can digitize the desired frequency spectrum directly from an antenna, present it to a digital signal processor, and output it to an application for revealing sensitive data. A Grdović, M. et al, Screen reading: electromagnetic information leakage from the computer monitor, pp.836-855 variety of countermeasures, such as shielding, zoning, soft TEMPEST, and similar techniques, can be used to prevent data leakage.
Keywords :
electromagnetic emission , information leakage , computer monitor ,
Journal title :
Military Technical Courier
Journal title :
Military Technical Courier
Record number :
2736264
Link To Document :
بازگشت