100 likes | 115 Views
Explore the realm of emissions security (EMSEC) and the various attacks and defenses associated with it, from Tempest devices to power analysis techniques. Learn about the history, passive and active attacks, countermeasures, and key resource links in this field.
E N D
Chapter 15 Emission Security
Introduction • Emissions Security (Emsec) • Tempest defenses • Stray RF emitted by Electronics • Power Analysis • Set back Smart Card industry • Electro magnetic eavesdropping • ATMs • Wireless Technologies • RF devices
History • Crosstalk between lines • WWI laid transmission cables on ground, could then easily intercept traffic • Used in Britain to detect number of TVs • Power Analysis used to detect number of phones • 1996 attack on smart cards set the industry back (power analysis)
Emsec attack devices • Radio microphone, camera (the x10) • http://www.securityprousa.com/nanmayleavho.html • Laser Microphones • High end devices • Tempest devices • Countermeasures • Nonlinear junction detector • Surveillance receivers • Physical measures
Other attacks • Cordless phones are easy to eavesdrop • PBX can be reprogrammed to support surveillance • Laptops with microphones can record messages in a room and email them to the attacker • NSA banned furbys
Passive attacks • Take advantage of signals available • Power analysis • Signals often transmitted out over power lines • Red/black separation • Smart cards • Leakage through RF signals
Active attacks • Tempest Viruses • Nonstop • Glitching • Combination Attacks • Commercial Exploitation • http://www.sptimes.com/News/013100/Technology/Your_car_radio_may_be.shtml
Articles • Commercial Tempest attacks • Commercial active attacks
Links to resourses • Emissions Security • http://www.atis.org/tg2k/_emission_security.html • Tempest • http://en.wikipedia.org/wiki/EMSEC • http://www.fas.org/irp/program/security/tempest.htm • Power Analysis • http://en.wikipedia.org/wiki/Side_channel_attack • http://en.wikipedia.org/wiki/Power_analysis • http://en.wikipedia.org/wiki/Timing_attack
Links to resources • History • http://cryptome.org/tempest-old.htm • NONSTOP HIJACK • http://www.answers.com/topic/tempest • Glitching • http://computing-dictionary.thefreedictionary.com/glitch+attack