Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Acoustic Cryptanalysis

Up
vote
Down

Am I still vulnerable if I include a few silent consonants in my password?
A powerful method for extracting information from supposedly secure systems is side-channel attacks: cryptanalytic techniques that rely on information unintentionally leaked by computing devices. Most side-channel attack research has focused on electromagnetic emanations (TEMPEST), power consumption and, recently, diffuse visible light from CRT displays. The oldest eavesdropping channel, namely acoustic emanations, has received little attention. Our preliminary analysis of acoustic emanations from personal computers shows them to be a surprisingly rich source of information on CPU activity.
 read more | mail this link | score:5054 | -Ray, May 14, 2004
More Sysadmin articles...

Large Abstract Art with Fine Details and Textures

admin headlines

Running ProcessWire on Nginx (Debian 7 / Ubuntu 13.04)

Tutorial: Install Apache2, PHP5, MySQL on Fedora 17

Monitor OSX and Linux with Nagios and SNMP

Web Filtering on Squid Proxy

GlusterFS Tutorial: Create an NFS-Like Storage Server on Ubuntu 11.10

Passworded web directories with mod_auth_mysql on Apache2 (Debian 6)

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin