Computer security compromised by hardware failure

Results: 7



#Item
1Surveillance / Security / TEMPEST / United States government secrecy / Electromagnetic interference / Spread spectrum / Smart card / Electromagnetic compatibility / Computer security compromised by hardware failure / Espionage / National security / Signals intelligence

Chapter 15: Emission Security C H A P TE R 15 Emission Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 05:57:56
2Input/output / Computer keyboard / Speech recognition / Typing / Cepstrum / Linear classifier / Password / Function key / Computer security compromised by hardware failure / Human–computer interaction / Computing / Statistics

To appear in the ACM Transactions on Information and Systems Security Keyboard Acoustic Emanations Revisited Li Zhuang, Feng Zhou, J. D. Tygar University of California, Berkeley {zl,zf,tygar}@cs.berkeley.edu

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2009-09-11 13:19:34
3Power analysis / Side channel attack / Timing attack / Tamper resistance / RSA / Differential fault analysis / KeeLoq / Computer security compromised by hardware failure / Cryptography / Espionage / Public-key cryptography

Hardware Attacks on Cryptographic Devices Implementation Attacks on Embedded Systems and Other Portable Hardware Jem Berkes University of Waterloo Prepared for ECE 628, Winter 2006

Add to Reading List

Source URL: www.berkes.ca

Language: English - Date: 2006-04-11 01:44:56
4Surveillance / Signals intelligence / Computer keyboard / TEMPEST / Computer security / Computer security compromised by hardware failure / Digital / Side channel attack / Anechoic chamber / Espionage / Electronic engineering / Electronics

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards Martin Vuagnoux EPFL, Lausanne, Switzerland [removed]

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:43:22
5Smartphones / Electronic engineering / Accelerometers / Digital audio players / Computer keyboard / Text messaging / Recall / Ambient Vibrations / Computer security compromised by hardware failure / IPhone / Technology / Computing

(sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers Philip Marquardt∗ Arunabh Verma, Henry Carter and Patrick Traynor

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2012-11-26 22:15:06
6Surveillance / Security / TEMPEST / United States government secrecy / Electromagnetic interference / Spread spectrum / Smart card / Electromagnetic compatibility / Computer security compromised by hardware failure / Espionage / National security / Signals intelligence

Chapter 15: Emission Security C H A P TE R 15 Emission Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 05:57:56
7Apple Inc. / Apple Keyboard / Click consonant / Virtual keyboard / IBM PC keyboard / Function key / QWERTY / Computer security compromised by hardware failure / Computer keyboards / Input/output / Human–computer interaction

Keyboard Acoustic Emanations Dmitri Asonov Rakesh Agrawal

Add to Reading List

Source URL: rakesh.agrawal-family.com

Language: English - Date: 2006-04-01 15:54:42
UPDATE