Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields
Air-gapped computers are devices that are kept isolated from the Internet, because they
store and process sensitive information. When highly sensitive data is involved, an air …
store and process sensitive information. When highly sensitive data is involved, an air …
Echo TEMPEST: EM information leakage induced by IEMI for electronic devices
Electromagnetic (EM) information leakage encourages attacks, wherein the attackers
passively capture and analyze EM waves that are unintentionally generated by devices …
passively capture and analyze EM waves that are unintentionally generated by devices …
Compromising electromagnetic emanations of wired USB keyboards
The TEMPEST methods and procedures focus on classified information carriers generated
by any electronic devices through electromagnetic radiation. Any electromagnetic radiation …
by any electronic devices through electromagnetic radiation. Any electromagnetic radiation …
Estimate of minimum attenuation level for a TEMPEST shielded enclosure
M Popescu, V Bîndar, R Craciunescu… - 2016 International …, 2016 - ieeexplore.ieee.org
TEMPEST procedures are a series of protection measures that are used to protect the IT
infrastructure against electromagnetic eavesdropping. This paper presents the main …
infrastructure against electromagnetic eavesdropping. This paper presents the main …
Video signal recovery from the laser printer LCD display
This paper presents a new approach to the TEMPEST compromising signals emitted by the
printing devices. From the TEMPEST point of view, only the laser printer diodes and the …
printing devices. From the TEMPEST point of view, only the laser printer diodes and the …
Analysis and simulation of cable crosstalk
V Solak, HS Efendioglu, B Colak… - 2017 IV International …, 2017 - ieeexplore.ieee.org
Crosstalk is an important phenomenon for both EMC (electromagnetic compatibility) and
TEMPEST. Crosstalk prevention requirements for cables can be found in many different …
TEMPEST. Crosstalk prevention requirements for cables can be found in many different …
Electromagnetic vulnerabilities of LCD projectors
This paper presents for the first time a study on the security of information processed by
video projectors. Examples of video recovery from the electromagnetic radiation of these …
video projectors. Examples of video recovery from the electromagnetic radiation of these …
Protection of Modular Data Centers from Cyber Attack via Electromagnetic Emanations
S Saadat - 2021 Asia-Pacific International Symposium on …, 2021 - ieeexplore.ieee.org
Both physical and cybersecurity designs are vital for Data Centers. Applying an adequate
physical security measure to prevent a possible cyber-attack is essential as part of this …
physical security measure to prevent a possible cyber-attack is essential as part of this …
Considerations on estimating the minimal level of attenuation in TEMPEST filtering for IT equipments
The main purpose of this research is to improve the security of critical computer systems with
minimal costs. One of the main problems in such cases is the secondary emissions …
minimal costs. One of the main problems in such cases is the secondary emissions …
Alternative Materials for TEMPEST Facility Architectural Shielding
HS Efendioglu, V Solak, F Bulut - … International Symposium on …, 2024 - ieeexplore.ieee.org
Shielding is a fundamental aspect of TEMPEST precautions, preventing the interception of
classified information within a defined zone. While existing literature analyzes shielding …
classified information within a defined zone. While existing literature analyzes shielding …