1 / 10

Chapter 15

Chapter 15 . Emission Security. Introduction. Emissions Security (Emsec) Tempest defenses Stray RF emitted by Electronics Power Analysis Set back Smart Card industry Electro magnetic eavesdropping ATMs Wireless Technologies RF devices. History. Crosstalk between lines

lrauch
Download Presentation

Chapter 15

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 15 Emission Security

  2. Introduction • Emissions Security (Emsec) • Tempest defenses • Stray RF emitted by Electronics • Power Analysis • Set back Smart Card industry • Electro magnetic eavesdropping • ATMs • Wireless Technologies • RF devices

  3. History • Crosstalk between lines • WWI laid transmission cables on ground, could then easily intercept traffic • Used in Britain to detect number of TVs • Power Analysis used to detect number of phones • 1996 attack on smart cards set the industry back (power analysis)

  4. Emsec attack devices • Radio microphone, camera (the x10) • http://www.securityprousa.com/nanmayleavho.html • Laser Microphones • High end devices • Tempest devices • Countermeasures • Nonlinear junction detector • Surveillance receivers • Physical measures

  5. Other attacks • Cordless phones are easy to eavesdrop • PBX can be reprogrammed to support surveillance • Laptops with microphones can record messages in a room and email them to the attacker • NSA banned furbys

  6. Passive attacks • Take advantage of signals available • Power analysis • Signals often transmitted out over power lines • Red/black separation • Smart cards • Leakage through RF signals

  7. Active attacks • Tempest Viruses • Nonstop • Glitching • Combination Attacks • Commercial Exploitation • http://www.sptimes.com/News/013100/Technology/Your_car_radio_may_be.shtml

  8. Articles • Commercial Tempest attacks • Commercial active attacks

  9. Links to resourses • Emissions Security • http://www.atis.org/tg2k/_emission_security.html • Tempest • http://en.wikipedia.org/wiki/EMSEC • http://www.fas.org/irp/program/security/tempest.htm • Power Analysis • http://en.wikipedia.org/wiki/Side_channel_attack • http://en.wikipedia.org/wiki/Power_analysis • http://en.wikipedia.org/wiki/Timing_attack

  10. Links to resources • History • http://cryptome.org/tempest-old.htm • NONSTOP HIJACK • http://www.answers.com/topic/tempest • Glitching • http://computing-dictionary.thefreedictionary.com/glitch+attack

More Related