Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
TEMPEST attacks: Using a simple radio receiver
Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
2003 (English)Independent thesis Advanced level (degree of Master (One Year))Student thesisAlternative title
TEMPEST attacker : genom att använda en enkel radio (Swedish)
Abstract [en]

There are no public records that give an idea of how much emanation monitoring is actually taking place. However, there are a few data points that lead us to believe there is a real threat. One of these is that TEMPEST industry is over a billion dollars a year business. Reports like the ”Redefining Security” by Joint Security Commission stated that electronic equipment such as computers, printers, and electronic typewriters give off electromagnetic emanations and that this has long been a concern for various industries. An attacker using the latest and most efficient equipment can monitor and retrieve classified or sensitive information as it is being processed without the user being aware that a loss is occurring. But new information states that the attacker doesn’t need to have access to the latest equipment. This master thesis is based on the three statements below:  It exists a cheap and simple TEMPEST technique that is a security risk.  A downloadable TEMPEST virus is a powerful tool when conducting TEMPEST attacks.  It does not exist a cheap and simple solution that protects common users from TEMPEST attacks. In the experiment I use a program called Tempest_for_eliza and a simple Philips radio receiver. In this thesis I prove that it exist a TEMPEST technique, that is cheap and relatively simple and still is a security risk. I prove this with facts from literature studies and an experiment. Today there is only one way to protect yourself against TEMPEST attacks and that is by metal shielding. This is expensive and home users have the option but not often the resources to finance this type of protection.

Place, publisher, year, edition, pages
2003. , p. 16
Keywords [en]
TEMPEST, electromagnetic emanation, security, metal shielding
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:bth-1745Local ID: oai:bth.se:arkivex09F683436B727F6DC1256D47005237C1OAI: oai:DiVA.org:bth-1745DiVA, id: diva2:828995
Uppsok
Technology
Supervisors
Available from: 2015-05-11 Created: 2003-06-16 Last updated: 2018-01-11Bibliographically approved

Open Access in DiVA

fulltext(107 kB)5709 downloads
File information
File name FULLTEXT01.pdfFile size 107 kBChecksum SHA-512
7c2fc362d5a8380f73e67f9e7eed00850af71ef2ec9a7ff75e1a98c5717af581a15850c881671099aedb11623ab236eec8fb42094a277ba7a27f49776c339745
Type fulltextMimetype application/pdf

By organisation
Department of Software Engineering and Computer Science
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 5712 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 941 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf