The fundamental principles of the video leakage phenomena are describedĪnd examined in theory and by various measurements.Throughout the doctoral research these objectives are used as main guidelines.Ĭonsequently this resulted in the following: Determining effective countermeasures against a video eavesdrop attack.Modeling and simulating the EM radiation of a video signal cable.Performing quantitative analyses to gain new insights in the video leakage.Realizing various case studies to assess the video eavesdropping threat.Video emanations using COTS material to reconstruct the original video Realizing a video eavesdrop measurement method that exploits compromising.Video technologies using modern commercial off-the-shelf (COTS) material. Assessing and evaluating the compromising emanations of various modern.More detailed description of the objectives is specified below: Methods that exploit video leakage emissions, and effective countermeasures. To determine the video leakage mechanisms, the limits of video reconstruction This doctoral research will investigate different areas of this video security threat Have become outdated and still left us with many questions. Still one of the most notable works that thoroughly investigated this matter but Years later, Van Eck’s and Kuhn’s works are Leakage mechanisms and proved that digital based systems also suffer from these Kuhn’s workĬontinued Van Eck’s work and tried to shed some light on the exact video Report about compromising emanations of computer displays. Work in 1985 was a real eye-opener when he reconstructed the image of aĬathode ray tube (CRT) display with basic electronic equipment at a distance ofĬouple of meters. Kuhn (CompromisingĮmanations: eavesdropping risks of computer displays. Works of Wim Van Eck (Electromagnetic Radiation from Video Display Units:Īn Eavesdropping Risk? (1985)) and of Markus G. The first important contribution that is made in open literature are the
However only few of these methods are shared publicly due to strategic purposes. Methods and techniques that use these emanations to obtain secured information. But in literature, Tempest can also refer to a collection of Limiting electric or electromagnetic (EM) radiation emanations from electronicĮquipment”.
government code word that identifies a classified set of standards for Specifically focuses on the information security of video display units (VDUs)Ĭompromising radiation is often called Tempest radiation in literature. Gain unauthorized access due to the fact that it is untraceable, that no physicalĪccess nor a communication link is needed, and that cryptographic protocols andĪuthentication tokens are becoming more ubiquitous. This makes it possible to gainĪccess to sensitive or confidential information using unconventional methods Unintended information leaks will be created. These emissions orĮmanations will be correlated to processed information in some way. This suggests that worm creators are using worms for other objectives than simply infection, such as data theft and setting up denial of service networks.Įlectronic devices will emit energy in various forms.
Finally, more dangerous payloads are becoming commonplace. This trend implies a more urgent need for automated, coordinated protection measures. Fourth, recent worms have shown capabilities to spread faster and exploit more infection vectors. Unlike the independent efforts of early viruses, these variants suggest an increasing level of coordination among worm creators.
Third, recent worms are appearing as a series of quick successive variants. Second, despite widespread use of firewalls and other network security equipment, worm outbreaks still occur and will likely continue to be a threat for the near future. First, while viruses were more common than worms initially, worms have become the predominant threat in recent years, coinciding with the growth of computer networking. A review of their historical development and recent outbreaks leads to a number of observations.
Computer viruses and network worms have evolved through a continuous series of innovations, leading to the recent wave of fast-spreading and dangerous worms.