Information Leakage from Optical Emanations

07/13/2023
by   Joe Loughry, et al.
0

A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is significantly correlated with information being processed by the device. Physical access is not required; the attacker gains access to all data going through the device, including plaintext in the case of data encryption systems. Experiments show that it is possible to intercept data under realistic conditions at a considerable distance. Many different sorts of devices, including modems and Internet Protocol routers, were found to be vulnerable. A taxonomy of compromising optical emanations is developed, and design changes are described that will successfully block this kind of "Optical TEMPEST" attack.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/30/2019

("Oops! Had the silly thing in reverse")---Optical injection attacks in through LED status indicators

It is possible to attack a computer remotely through the front panel LED...
research
11/09/2017

Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators

The light-emitting diode(LED) is widely used as an indicator on the info...
research
10/31/2022

Optical Bar Code for Internet Access Application based on Optical camera communication and Bluetooth Control

We demonstrate an internet access application based on optical camera co...
research
05/26/2021

All-Indoor Optical Customer Premises Equipment for Fixed Wireless Access

We demonstrate an LED-based optical wireless link for fixed wireless acc...
research
03/23/2021

Sensitivity of Standard Library Cells to Optical Fault Injection Attacks in IHP 250 nm Technology

The IoT consists of a lot of devices such as embedded systems, wireless ...
research
08/27/2021

Dimming Down LED: An Open-source Threshold Implementation on Light Encryption Device (LED) Block Cipher

Lightweight block ciphers have been widely used in applications such as ...
research
09/06/2022

Dynamic optical path provisioning for alien access links: architecture, demonstration, and challenges

With the spread of Data Center Interconnect (DCI) and local 5G, there is...

Please sign up or login with your details

Forgot password? Click here to reset