Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Acoustic Cryptanalysis

Up
vote
Down

Am I still vulnerable if I include a few silent consonants in my password?
A powerful method for extracting information from supposedly secure systems is side-channel attacks: cryptanalytic techniques that rely on information unintentionally leaked by computing devices. Most side-channel attack research has focused on electromagnetic emanations (TEMPEST), power consumption and, recently, diffuse visible light from CRT displays. The oldest eavesdropping channel, namely acoustic emanations, has received little attention. Our preliminary analysis of acoustic emanations from personal computers shows them to be a surprisingly rich source of information on CPU activity.
 read more | mail this link | score:4752 | -Ray, May 14, 2004
More Sysadmin articles...

Beautiful Abstract Art Prints

admin headlines

Tutorial: Headless VirtualBox 4.2 and phpvirtualbox on Ubuntu 12.04

Add WiKID Two-Factor Authentication to OpenVPN Community On Ubuntu 13.04

tutorial: Build a Debian 7 server

Virtual Hosting: Proftpd, MySQL on Ubuntu 12.10

Tutorial: PureFTPd using ClamAV for Virus scans on Fedora 18

Tutorial MySQLD: Bind to Multiple IP Address

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin