Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Acoustic Cryptanalysis

Up
vote
Down

Am I still vulnerable if I include a few silent consonants in my password?
A powerful method for extracting information from supposedly secure systems is side-channel attacks: cryptanalytic techniques that rely on information unintentionally leaked by computing devices. Most side-channel attack research has focused on electromagnetic emanations (TEMPEST), power consumption and, recently, diffuse visible light from CRT displays. The oldest eavesdropping channel, namely acoustic emanations, has received little attention. Our preliminary analysis of acoustic emanations from personal computers shows them to be a surprisingly rich source of information on CPU activity.
 read more | mail this link | score:4835 | -Ray, May 14, 2004
More Sysadmin articles...

Buy Large Abstract Art Prints

Selected articles

VPS: Xen vs. OpenVZ

Apple DIY Repair

How to install Ubuntu Linux on the decTOP SFF computer

Mono-culture and the .NETwork effect

Shadow.sh: A simple directory shadowing script for Linux

The life cycle of a programmer

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin