DocumentCode :
3023102
Title :
Tempest in a Teapot: Compromising Reflections Revisited
Author :
Backes, Michael ; Chen, Tongbo ; Duermuth, M. ; Lensch, Hendrik P A ; Welk, Martin
Author_Institution :
Saarland Univ., Saarbrucken, Germany
fYear :
2009
fDate :
17-20 May 2009
Firstpage :
315
Lastpage :
327
Abstract :
Reflecting objects such as tea pots and glasses, but also diffusely reflecting objects such as a user´s shirt, can be used to spy on confidential data displayed on a monitor. First, we show how reflections in the user´s eye can be exploited for spying on confidential data. Second, we investigate to what extent monitor images can be reconstructed from the diffuse reflections on a wall or the user´s clothes, and provide information-theoretic bounds limiting this type of attack. Third, we evaluate the effectiveness of several countermeasures. This substantially improves previous work (Backes et al., IEEE Symposium on Security & Privacy, 2008).
Keywords :
reflection; security of data; confidential data; diffuse reflections; glasses; image reconstruction; information-theoretic bounds; reflecting objects; tea pots; Apertures; Computerized monitoring; Electromagnetic reflection; Focusing; Humans; Image reconstruction; Optical diffraction; Optical reflection; Optical sensors; Telescopes;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 2009 30th IEEE Symposium on
Conference_Location :
Berkeley, CA
ISSN :
1081-6011
Print_ISBN :
978-0-7695-3633-0
Type :
conf
DOI :
10.1109/SP.2009.20
Filename :
5207653
Link To Document :
بازگشت