Filters








8 Hits in 5.4 sec

Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel [article]

Zhuoran Liu, Niels Samwel, Léo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha Larson
2020 arXiv   pre-print
We introduce screen gleaning, a TEMPEST attack in which the screen of a mobile device is read without a visual line of sight, revealing sensitive information displayed on the phone screen.  ...  The screen gleaning attack uses an antenna and a software-defined radio (SDR) to pick up the electromagnetic signal that the device sends to the screen to display, e.g., a message with a security code.  ...  A special word of appreciation to Frits, Henan, Jan, Maikel, and Mia, who contributed time with their phones, so that we could carry out screen gleaning attacks.  ... 
arXiv:2011.09877v1 fatcat:gyi7w5xumjdbnl7aou2h4gowua

Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel

Zhuoran Liu, Niels Samwel, Léo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha Larson
2021 Proceedings 2021 Network and Distributed System Security Symposium   unpublished
We introduce screen gleaning, a TEMPEST attack in which the screen of a mobile device is read without a visual line of sight, revealing sensitive information displayed on the phone screen.  ...  The screen gleaning attack uses an antenna and a software-defined radio (SDR) to pick up the electromagnetic signal that the device sends to the screen to display, e.g., a message with a security code.  ...  A special word of appreciation to Frits, Henan, Jan, Maikel, and Mia, who contributed time with their phones, so that we could carry out screen gleaning attacks.  ... 
doi:10.14722/ndss.2021.23021 fatcat:gngdohom4neylk3ldfuvrh7xei

Physical key extraction attacks on PCs

Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer
2016 Communications of the ACM  
Attacks on PCs key insights ˽ Small differences in a program's data can cause large differences in acoustic, electric, and electromagnetic emanations as the program runs. ˽ These emanations can be measured  ...  through inexpensive equipment and used to extract secret data, even from fast and complex devices like laptop computers and mobile phones. ˽ Common hardware and software are vulnerable, and practical  ...  Acknowledgments This article is based on our previous research, 12, 13, 15, 16  ... 
doi:10.1145/2851486 fatcat:5z2tc6e2lve2hgncsbcwlefmlq

Privacy on the line: the politics of wiretapping and encryption

1998 ChoiceReviews  
information gleaned from a wiretap).  ...  The circumstances, however, give the opponent a measure of control over what is transmitted on the channel and may provide the opportunity for a chosen-plaintext attack (see chapter 2) on the cryptography  ...  , 148, 149 Church Committee on, 137, 170, 170, [200] [201] [202] 11 dimensions of, [141] [142] 128-131, 194 legalization of, 192-195 limits on, 193-195 minimization of, 372 in nineteenth century,  ... 
doi:10.5860/choice.35-6456 fatcat:zlca7qql2ffevobnzs5qckmyqq

Drawing on the Victorians: the palimpsest of Victorian and neo-Victorian graphic texts

Nicole Lobdell
2019 Nineteenth-Century Contexts  
But because she hunts, Eian knows of an outlet on the other side.  ...  tempests that threatened generation" and brought death (66).  ... 
doi:10.1080/08905495.2019.1569808 fatcat:enlqseqhkfebzgqbwgumkb72xe

The Audacity to Imagine Alternative Futures: An Afrofuturist Analysis of Sojourner Truth and Janelle Monae's Performances of Black Womanhood as Instruments of Liberation [article]

(:Unkn) Unknown, University, My, Molefi Kete Asante
2020
When examining Africana agency using an Afrofuturism perspective, the researcher should examine the devices, techniques, and processes – externally or intra-culturally generated – that have the potential  ...  Its foundational assumption is the pantechnological perspective, a theory that assumes "everything can be interpreted as a type of technology."  ...  " We live in an era in which the presence of a cyborg is no longer a shocking transgression, but rather a lived reality of contemporary due to cellphones and other mobile and wireless devices augmenting  ... 
doi:10.34944/dspace/3808 fatcat:zyy625zvfvgfxb5ius2x3dq32y

Annotations to Geoffrey Hill's Speech! Speech!

Ann Hassan
unpublished
But see also stanza 15. 50.5 armatured The armature is the moving part in an electromagnetic device, wound with coils that carry a current; here, the airport metal detector. 50.6 Even if it kills me A  ...  " into an "elaborate" device.  ...  Cf. the 1998 film Waking Ned Devine, in which an Irish village unites to defraud a Lotto claim inspector after a fellow villager dies before redeeming his winning ticket. 109.8 Bodhrans An Irish hand-held  ... 
fatcat:s5hchpu2kzbtxfai5s3g5akduy

Shakespeare, Performance and Embodied Cognition

Darren Tunstall
2019
I draw on the Stereotype Content Model to show how signals of warmth and competence play a primary role in an encounter, where smoothness of movement is such a signal.  ...  I show how this concept is an extension of the idea of smoothness. The third item, a book chapter, asks upon what basis of evidence we can train an actor to improve their timing.  ...  This is why it can be so difficult to read a person's emotions from an unposed expression in a photo: emotional expressions are mobile.  ... 
doi:10.15126/thesis.00853217 fatcat:vj4fj42jiraxlnbkttuidovpbe