Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations

  • Markus G. Kuhn
  • Ross J. Anderson
Conference paper

DOI: 10.1007/3-540-49380-8_10

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)
Cite this paper as:
Kuhn M.G., Anderson R.J. (1998) Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. In: Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg

Abstract

It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control the electromagnetic radiation it transmits. This can be used for both attack and defence. To attack a system, malicious code can encode stolen information in the machine’s RF emissions and optimise them for some combination of reception range, receiver cost and covertness. To defend a system, a trusted screen driver can display sensitive information using fonts which minimise the energy of these emissions. There is also an interesting potential application to software copyright protection.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag 1998

Authors and Affiliations

  • Markus G. Kuhn
    • 1
  • Ross J. Anderson
    • 1
  1. 1.University of CambridgeCambridgeUK

Personalised recommendations