DOC PREVIEW
Berkeley COMPSCI 161 - UI Side Channel Snooping

This preview shows page 1-2-3 out of 10 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

UI Side Channel Snooping• Victor switches to an LCD display. Any other waysAnn can still steal his display contents or hiskeystrokes?• Cables from computer to screen & keyboard act ascrude antennas!– Broadcast weak RF signals corresponding to datastreams– Even induce faint voltage fluctuations in power lines• Keystrokes create sound– Audio components unique per key– Timing reflects key sequencing / touch typing patterns• If language known, can employ spell-checking to clean up errors– Can “listen” from a distance using laser + telescope!UI Side Channel Snooping• Victor switches to an LCD display. Any other waysAnn can still steal his display contents or hiskeystrokes?• Cables from computer to screen & keyboard act ascrude antennas!– Broadcast weak RF signals corresponding to datastreams– Even induce faint voltage fluctuations in power lines• Keystrokes create sound– Audio components unique per key– Timing reflects key sequencing / touch typing patterns• If language known, can employ spell-checking to clean up errors– Can “listen” from a distance using laser +


View Full Document

Berkeley COMPSCI 161 - UI Side Channel Snooping

Documents in this Course
Rootkits

Rootkits

11 pages

Load more
Download UI Side Channel Snooping
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view UI Side Channel Snooping and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view UI Side Channel Snooping 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?