Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Acoustic Cryptanalysis

Up
vote
Down

Am I still vulnerable if I include a few silent consonants in my password?
A powerful method for extracting information from supposedly secure systems is side-channel attacks: cryptanalytic techniques that rely on information unintentionally leaked by computing devices. Most side-channel attack research has focused on electromagnetic emanations (TEMPEST), power consumption and, recently, diffuse visible light from CRT displays. The oldest eavesdropping channel, namely acoustic emanations, has received little attention. Our preliminary analysis of acoustic emanations from personal computers shows them to be a surprisingly rich source of information on CPU activity.
 read more | mail this link | score:5008 | -Ray, May 14, 2004
More Sysadmin articles...

Abstract Art Prints on Canvas

Selected articles

How to install Ubuntu Linux on the decTOP SFF computer

Space Tyrant: A multiplayer network game for Linux

Space Tyrant: A threaded C game project: First Code

The Supreme Court is wrong on Copyright Case

No, RMS, Linux is not GNU/Linux

The life cycle of a programmer

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin