Stealing Keys from PCs using a Radio

http://www.tau.ac.il/~tromer/radioexp/ We demonstrate the extraction of secret decryption keys from laptop computers, by nonintrusively measuring electromagnetic emanations for a few seconds from a distance of 50 cm. The attack can be executed using cheap and readily-available equipment: a consumer-grade radio receiver or a Software Defined Radio USB dongle. The setup is compact and can operate untethered; it can be easily concealed, e.g., inside pita bread. Perhaps someday extensible to coffeeshop pretext: "hey, can you help me test my bitcoin, let's swap a satoshi..."

From: grarpamp <grarpamp@gmail.com> Subject: Stealing Keys from PCs using a Radio Even in 1977, when I had just built my 'Dyna Micro' https://en.wikipedia.org/wiki/Single-board_computer microprocessor trainer board, I could tell that its emanations on the AM radio band were were quite distinctive: I could monitor the progress of programs merely by listening to an otherwise-unoccupied AM frequency. While I wasn't particularly interested in the details at that time, it has long been obvious that a program could be written to emit specific data, perhaps by repeating segments of code based on the information to be transmitted. Jim Bell

On Mon, Jul 13, 2015 at 7:36 PM, jim bell <jdb10987@yahoo.com> wrote:
From: grarpamp <grarpamp@gmail.com>
Subject: Stealing Keys from PCs using a Radio
Even in 1977, when I had just built my 'Dyna Micro' https://en.wikipedia.org/wiki/Single-board_computer microprocessor trainer board, I could tell that its emanations on the AM radio band were were quite distinctive: I could monitor the progress of programs merely by listening to an otherwise-unoccupied AM frequency. While I wasn't particularly interested in the details at that time, it has long been obvious that a program could be written to emit specific data, perhaps by repeating segments of code based on the information to be transmitted. Jim Bell
While I was not born yet back then, less than twenty years later I built such program, playing with control messages sent from the host to the AT keyboard. Alfonso
participants (3)
-
Alfonso De Gregorio
-
grarpamp
-
jim bell