Realistic eavesdropping attacks on computer displays with low-cost and mobile receiver system

Fürkan Elibol*, Uǧur Sarac, Işin Erer

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

40 Citations (Scopus)

Abstract

It is known that the computer display images can be reconstructed from display's radio frequency emanations. This is a big information leakage threat for information security. Recently published eavesdropping systems are very expensive and not portable. Furthermore all the published eavesdropping attacks are demonstrated for distance up to 10 meters away from display. In this work, a low-cost and all-in-one mobile receiver is combined to capture emanations from long distance approximately 50 meters away from display and to reconstruct the display images. In our eavesdropping scenario, receiver system is in a building and the target display is in another building. These experiments show that 26 points and bigger fonts can be read easily from the reconstructed images which are captured from the target display approximately 50 meters away. With this new system, we can also capture emanations from 3 meters away of the target display in an office environment for comparison. In this latter experiment 9 points and bigger fonts can be read easily.

Original languageEnglish
Title of host publicationProceedings of the 20th European Signal Processing Conference, EUSIPCO 2012
Pages1767-1771
Number of pages5
Publication statusPublished - 2012
Event20th European Signal Processing Conference, EUSIPCO 2012 - Bucharest, Romania
Duration: 27 Aug 201231 Aug 2012

Publication series

NameEuropean Signal Processing Conference
ISSN (Print)2219-5491

Conference

Conference20th European Signal Processing Conference, EUSIPCO 2012
Country/TerritoryRomania
CityBucharest
Period27/08/1231/08/12

Keywords

  • compromising emanations
  • eavesdropping
  • information leakage
  • TEMPEST
  • video displays

Fingerprint

Dive into the research topics of 'Realistic eavesdropping attacks on computer displays with low-cost and mobile receiver system'. Together they form a unique fingerprint.

Cite this