Skip to main content
Log in

Whispering Devices: A Survey on How Side-channels Lead to Compromised Information

  • Published:
Journal of Hardware and Systems Security Aims and scope Submit manuscript

Abstract

While operating, information processing devices or communication systems may emit unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or power drain. These side-channels can be intercepted by anyone with scientific or technical knowledge and appropriate equipment, leading to a potentially high risk of security breaches. This survey focuses on these emanation side-channels and provides an extensive literature review. To provide an in-depth analysis despite the variety of attacks, we propose to classify the side-channels based on their intentionality, the type of attackers and the physical medium. Illustrative use-cases are presented and serve as a basis to infer individual threats. Particular attention is paid to electromagnetic side-channels which exhibit the highest criticality and have therefore been used in the most recent attacks. The main characteristics of the side-channels revealed by state-of-the-art papers are summarized, and recommendations on countermeasures are provided to protect any sensitive equipment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Sullivan DT (2015) Survey of Malware Threats and Recommendations to Improve Cybersecurity for Industrial Control Systems. https://apps.dtic.mil/dtic/tr/fulltext/u2/a617910.pdf

  2. Pfleeger SL, Rue R (2008) Cybersecurity Economic Issues: Clearing the Path to Good Practice IEEE Software, 25(1)35–42, 1

  3. Aichinger B (2015) DDR memory errors caused by Row Hammer. In Proc. IEEE High Performance Extreme Computing Conference (HPEC), 9

  4. Ge Q, Yarom Y, Li F, Heiser G (2016) Your Processor Leaks Information - and There’s Nothing You Can Do About It. 12

  5. Kocher P, Genkin D, Gruss D, Haas W, Hamburg M, Lipp M, Mangard S, Prescher T, Schwarz M, Yarom Y (2018) Spectre Attacks: Exploiting Speculative Execution. 1

  6. Lipp M, Kogler A, Oswald D, Schwarz M, Easdon C, Canella C, Gruss D (2021) PLATYPUS: Software-based Power Side-Channel Attacks on x86. In Proc, IEEE Symposium on Security and Privacy (SP)

    Google Scholar 

  7. Fan J, Guo X, Mulder ED, Schaumont P, Preneel B, Verbauwhede I (2010) State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures. In Proc. IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)

  8. Hayashi YI, Homma N (2018) Introduction to Electromagnetic Information Security. IEICE Transactions on Communications, E102.B(1):40–50. Available: https://www.jstage.jst.go.jp/article/transcom/E102.B/1/E102.B_2018EBI0001/_pdf/-char/en

  9. Brent C, Carlisle A. A survey and taxonomy aimed at the detection and measurement of covert channels. In Proc. 4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec)

  10. Giechaskiel I, Rasmussen K. Taxonomy and challenges of out-of-band signal injection attacks and defenses

  11. NSA. VAGRANT program, July 2008. Catalogue extract: https://cryptome.org/2013/12/nsa-catalog-appelbaum.pdf

  12. Guri M (2018) BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets. 4

  13. NSA (1982) NACSIM 5000: Tempest Fundamentals. National Security Agency. Partially declassified transcript: https://cryptome.org/jya/nacsim-5000/nacsim-5000.html

  14. NSA. National Security Telecommunications and Information Systems Security Advisory Memorandum NSTISSAM TEMPEST/2-95: RED/BLACK Installation Guidance. transcript: https://cryptome.org/tempest-2-95.html

  15. Barenghi A, Breveglieri L, Koren I, Naccache D (2012) Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures. Proceedings of the IEEE 100(11):3056–3076

    Article  Google Scholar 

  16. Lucas A, Tisserand A (2018) Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC. In Proc. International Conference on Security and Cryptography (SECRYPT), 6 2018

  17. Guri M, Elovici Y (2018) Bridgeware. Communications of the ACM, 61(4):74–82, 3

  18. Du YL, Lu YH, Zhang JL (2013) Novel Method to Detect and Recover the Keystrokes of PS/2 Keyboard. Progress In Electromagnetics Research C, 41:151–161, 6

  19. Spolaor R, Abudahi L, Moonsamy V, Conti M, Poovendran R (2017) No free charge theorem: A covert channel via USB charging cable on mobile devices. In Applied Cryptography and Network Security, pages 83–102

  20. Mangard S (2002) A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. In Proc. International Conference on Information Security and Cryptology (ICISC), pages 343–358, 4

  21. Kocher P, Jaffeand J, Jun B (1999) Differential Power Analysis. In Proc. Advances in Cryptology (CRYPTO), pages 388–397, 12

  22. Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. In Proc. Advances in Cryptology (CRYPTO), pages 513–525, 8

  23. Lohrke H, Tajik S, Krachenfels T, Boit C, Seifert JP (2019) Key extraction using thermal laser stimulation. 10

  24. Le TH, Canovas C, Dire J (2008) An overview of side channel analysis attacks. In Proc. ACM symposium on Information, computer and communications security (ASIACCS)

  25. Eisenbarth T, Paar C, Weghenkel B. Building a side channel based disassembler. In Transactions on Computational Science X

  26. Park J, Xu X, Jin Y, Forte D, Tehranipoor M. Power-based side-channel instruction-level disassembler. In Proc. ACM/ESDA/IEEE Design Automation Conference (DAC)

  27. Backes M, Drmuth M, Gerling S, Pinkal M, Sporleder C (2010) Acoustic Side-Channel Attacks on Printers. In USENIX Security Symposium, pages 307–322, 9

  28. Asonov D, Agrawal R (2004) Keyboard acoustic emanations. In Proc. IEEE Symposium on Security and Privacy (SP), 6

  29. Compagno A, Conti M, Lain D, Tsudik G (2017) Don’t Skype & Type! In Proc. ACM Asia Conference on Computer and Communications Security (ASIACCS), 4. Available: https://doi.org/10.1145/3052973.3053005

  30. Anand SA, Saxena N (2018) Keyboard emanations in remote voice calls. In Proc. ACM Conference on Data and Application Security and Privacy (CODASPY)

  31. Tromer E (2004) Acoustic cryptanalysis: on nosy people and noisy machines. Eurocrypt Rump Session, 5

  32. Genkin D, Shamir A, and Tromer E (2014) RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. In Proc. Advances in Cryptology (CRYPTO), pages 444–461, 10

  33. Genkin D, Pattani M, Schuster R, and Tromer E (2018) Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels. 8

  34. Hanspach M, Goetz M (2013) On Covert Acoustical Mesh Networks in Air. Journal of Communications, 8(11):758–767, 11

  35. Guri M, Solewicz Y, Zadov B, Daidakulov A, Elovici Y (2018) MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication. 3

  36. Guri M, Solewicz Y, Zadov B, Daidakulov A, Elovici Y (2017) Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise (‘DiskFiltration’). In Proc. Computer Security (ESORICS), pages 98–115, 8

  37. Guri M, Solewicz Y, Daidakulov A, Elovici Y (2016) Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers. 6

  38. Kuhn MG (2002) Optical Time-Domain Eavesdropping Risks of CRT Displays. In Proc. IEEE Symposium on Security and Privacy (SP), 5

  39. Backes M, Unruh D (2008) Compromising Reflections-or-How to Read LCD Monitors around the Corner. In Proc, IEEE Symposium on Security and Privacy (SP)

    Book  Google Scholar 

  40. Backes M, Chen T, Duermuth M, Lensch HP, and Welk M (2009) Tempest in a Teapot: Compromising Reflections Revisited. In Proc. IEEE Symposium on Security and Privacy (SP), 5

  41. Loughry J, Umphress DA (2002) Information leakage from optical emanations. ACM Transactions on Information and System Security, 5(3):262–289, 8

  42. Guri M, Zadov B, Daidakulov A, Elovici Y (2017) xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs. 6

  43. Guri M, Zadov B, Y. (2017) LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED. Detection of Intrusions and Malware, and Vulnerability Assessment, pages 161–184, 2

  44. Sepetnitsky V, Guri M, Elovici Y (2014) Exfiltration of Information from Air-Gapped Machines Using Monitor’s LED Indicator. In Proc. IEEE Joint Intelligence and Security Informatics Conference (JISIC), 9

  45. Guri M, Hasson O, Kedma G, Elovici Y (2016) An optical covert-channel to leak data through an air-gap. In Proc. IEEE Annual Conference on Privacy, Security and Trust (PST), 12

  46. Barisani A, Bianco D (2009) Side channel attacks using optical sampling of mechanical energy and power line leakage. In defcon 17. Available: https://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-barisani-bianco-sniff_keystrokes.pdf

  47. Nassi B, Pirutin Y, Shamir A, Elovici Y, Zadov B. Lamphone: Real-time passive sound recovery from light bulb vibrations. In Blackhat USA

  48. Balagani K, Cardaioli M, Conti M, Gasti P, Georgiev M, Gurtler T, Lain D, Miller C, Molas K, Samarin N, Saraci E, Tsudik G, Wu L (2019) Pilot: Password and pin information leakage from obfuscated typing videos. 3

  49. Chen Y, Li T, Zhang R, Zhang Y, Hedgpeth T (2018) EyeTell: Video-assisted touchscreen keystroke inference from eye movements. In IEEE Symposium on Security and Privacy (SP)

  50. Hayashi Y, Homma N, Toriumi Y, Takaya K, Aoki T (2017) Remote Visualization of Screen Images Using a Pseudo-Antenna That Blends Into the Mobile Environment. IEEE Transactions on Electromagnetic Compatibility, 59(1):24–33, 8

  51. NSA (1992) National Security Telecommunications and Information Systems Security Advi- sory Memorandum NSTISSAM TEMPEST/1-92: Compromising Emanations Lab- oratory Test Requirements, Partially declassified transcript: http://cryptome.org/nsa-tempest.htm

  52. Jiemin Z, Yongmei L (2013) The study of the standards architecture and the standards attributes based on EMC standards and TEMPEST standards in computer system. In Proc. International Conference on Computer Science & Education (ICCSE), 4

  53. Eck WV (1985) Electromagnetic radiation from video display units: An eavesdropping risk? Computers & Security, 4(4):269–286, 12

  54. Kuhn MG (2004) Electromagnetic Eavesdropping Risks of Flat-panel Displays. In Proc. International Conference on Privacy Enhancing Technologies (PET), pages 88–107, 5

  55. Kuhn MG (2006) Eavesdropping attacks on computer displays. In Proc. Information Security Summit (ISS), pages 24–25, 5

  56. Elibol F, Sarac U, and Erer I (2012) Realistic eavesdropping attacks on computer displays with low-cost and mobile receiver system. In Proc. European Signal Processing Conference (EUSIPCO), pages 1767–1771, 8

  57. Hayashi Y, Homma N, Miura M, Sone H (2014) A Threat for Tablet PCs in Public Space. In Proc. ACM Conference on Computer and Communications Security (SIGSAC), 11

  58. Zhang N, Lu Y, Cui Q, Wang Y (2017) Investigation of Unintentional Video Emanations From a VGA Connector in the Desktop Computers. IEEE Transactions on Electromagnetic Compatibility, 59(6):1826–1834, 12

  59. Shi J, Huang WQ, Wei D, Sun DG (2014) A novel method for computer video leaking signal detection. In Proc. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 8

  60. Marinov M (2014) Remote video eavesdropping using a software-defined radio platform. Master’s thesis, St Edmund’s College

  61. Yang W, Lu Y, Xu J (2010) Video information recovery from EM leakage of computers based on storage oscilloscope. Frontiers of Electrical and Electronic Engineering in China, 5(2):143–146, 4 2010

  62. Lee HS, Choi DH, Sim K, Yook JG (2019) Information Recovery Using Electromagnetic Emanations From Display Devices Under Realistic Environment. Transactions on Electromagnetic Compatibility, 61(4):1098–1106, 8

  63. Sayakkara A, Le-Khac N, Scanlon M (2018) Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors. In Proc. International Conference on Availability, Reliability and Security (ARES), 8. Available: https://doi.org/10.1145/3230833.3234690

  64. Thiele E (2001) Tempest for Eliza. Available: http://www.erikyyy.de/tempest/

  65. Guri M, Kedma G, Kachlon A, Elovici Y (2014) AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. In Proc. International Conference on Malicious and Unwanted Software (MALWARE), 10

  66. NSA (2007) TEMPEST: A Signal Problem, transcript: https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/cryptologic-spectrum/tempest.pdf

  67. Vuagnoux M, Pasini S (2009) Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. In USENIX Security Symposium, pages 1–16, 8

  68. Moll F, Roca M, Isern E (2003) Analysis of dissipation energy of switching digital CMOS gates with coupled outputs. Microelectronics Journal, 34(9):833–842, 9

  69. Smulders P (1990) The threat of information theft by reception of electromagnetic radiation from RS-232 cables. Computers & Security, 9(1):53–58, 2

  70. Schulz M, Klapper P, Hollick M, Tews E, Katzenbeisser S (2016) Trust the wire, they always told me! In Proc. ACM Conference on Security & Privacy in Wireless and Mobile Networks - (WiSec). Available: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publikationen/SEEMOO/wisec2016-trust-the-wire.pdf

  71. Sim DJ, Lee HS, Yook JG, Sim K (2016) Measurement and analysis of the compromising electromagnetic emanations from USB keyboard. In Proc. IEEE Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC), 5

  72. Choi HJ, Lee HS, Sim D, Yook JG, Sim K (2016) Reconstruction of leaked signal from USB keyboards. In Proc. IEEE Asia-Pacific Radio Science Conference (RASC), 8

  73. Zhang C, Zhang H, Luo J, Du Y (2017) TEMPEST in USB. In Proc. IEEE International Symposium on Electromagnetic Compatibility (EMC), 10

  74. Guri M, Monitz M, Elovici Y (2016) USBee: Air-gap covert-channel via electromagnetic emission from USB. In Proc. Annual Conference on Privacy, Security and Trust (PST), 12

  75. Guri M, Kachlon A, Hasson O, Kedma G, Mirsky Y, Elovici Y (2015) GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. In USENIX Security Symposium, 8

  76. Cui A (2015) Funtenna. Available: https://www.funtenna.org/

  77. Guri M, Zadov B, Daidakulov A, Elovici Y (2018) ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields. 2

  78. Matyunin N, Szefer J, Biedermann S, Katzenbeisser S (2016) Covert channels using mobile device’s magnetic field sensors. In Proc. Asia and South Pacific Design Automation Conference (ASP-DAC), 1

  79. Quisquater JJ, Samyde D (2001) ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In Proc. International Conference on Research in Smart Cards: Smart Card Programming and Security (E-SMART), pages 200–210, 9

  80. Heyszl J, Mangard S, Heinz B, Stumpf F, Sigl J (2012) Localized electromagnetic analysis of cryptographic implementations. In Lecture Notes in Computer Science, pages 231–244

  81. Meynard O, Ral D, Flament F, Guilley S, Homma N, Danger J (2011) Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques. In Proc. Design, Automation Test in Europe (DATE), pages 1–6

  82. Aboulkassimi D, Agoyan M, Freund L, Fournier J, Robisson B, Tria A (2011) ElectroMagnetic analysis (EMA) of software AES on Java mobile phones. In Proc. IEEE International Workshop on Information Forensics and Security (WIFS), 11

  83. Agrawal D, Archambeault B, Josyula R, Rohatgi P (2003) The EM Side-Channel(s). In Proc. Cryptographic Hardware and Embedded Systems (CHES), pp 29–45, 2. Available: https://dl.acm.org/citation.cfm?id=752713

  84. Goller G, Sigl G (2015) Side Channel Attacks on Smartphones and Embedded Devices Using Standard Radio Equipment. In Proc. International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE), pages 255–270, 7

  85. Alam M, Khan HA, Dey M, Sinha N, Callan R, Zajic A, Prvulovic M (2018) One&Done: A Single-Decryption EM-Based Attack on OpenSSL’s Constant-Time Blinded RSA. In USENIX Security Symposium, pp 585–602, 8. Available: https://www.usenix.org/conference/usenixsecurity18/presentation/alam

  86. Ware WH (1967) Security and privacy in computer systems. In Proc. Spring joint computer conference (SJCC), 4. https://pdfs.semanticscholar.org/8bdf/455e0ca083744fc89552764298171783703b.pdf

  87. Su Y, Genkin D, Ranasinghe D, Yarom Y (2017) USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs. In USENIX Security Symposium, pages 1145–1161, 8. Available: https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-su.pdf

  88. Yuan K, Grassi F, Spadacini G, Pignari SA (2017) Crosstalk-Sensitive Loops and Reconstruction Algorithms to Eavesdrop Digital Signals Transmitted Along Differential Interconnects. IEEE Transactions on Electromagnetic Compatibility, 59(1):256–265, 2

  89. Wei T, Wang S, Zhou A, Zhang X (2015) Acoustic Eavesdropping through Wireless Vibrometry. In Proc. International Conference on Mobile Computing and Networking (MobiCom), 9

  90. Union S. The Thing. Available: https://cryptomuseum.com/covert/bugs/thing/index.htm#ref/

  91. (2014) GBPPR. TAWDRYYARD Experiments. Available: https://www.qsl.net/n9zia/vision/index.html

  92. Ossmann M (2014) The NSA Playset: RF Retroreflectors. DEF CON 22:8

    Google Scholar 

  93. Wakabayashi S, Maruyama S, Mori T, Goto S, Kinugawa M, Hayashi YI, and Smith M (2018) A Feasibility Study of Radio-frequency Retroreflector Attack. In USENIX Workshop on Offensive Technologies, 8

  94. Kinugawa M, Fujimoto D, Hayashi Y (2019) Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure. Proc, IACR Cryptographic Hardware and Embedded Systems (CHES). Available: https://tches.iacr.org/index.php/TCHES/article/view/8345/7693

    Google Scholar 

  95. Camurati G, Poeplau S, Muench M, Hayes T, Francillon A (2018) Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. In Proc. ACM conference on Computer and communications security (CCS), 10

  96. Zhao M, Li T, Alsheikh MA, Tian Y, Zhao H, Torralba A, Katabi D (2018) Through-Wall Human Pose Estimation Using Radio Signals. In Proc. IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 6

  97. Ali K, Liu AX, Wang W, Shahzad M (2017) Recognizing Keystrokes Using WiFi Devices. IEEE Journal on Selected Areas in Communications 35(5):1175–1190

  98. Chen B, Yenamandra V, Srinivasan K (2015) Tracking Keystrokes Using Wireless Signals. In Proc. Annual International Conference on Mobile Systems, Applications, and Services - (MobiSys), 9

  99. Wang G, Zou Y, Zhou Z, Wu K, Ni LM (2016) We Can Hear You with Wi-Fi! IEEE Transactions on Mobile Computing, 15(11):2907–2920, 11

  100. Hettwer B, Gehrer S, Gneysu T (2019) Applications of machine learning techniques in side-channel attacks: a survey. Journal of Cryptographic Engineering

  101. Popescu M, Bindar V, Craciunescu R, Fratu O (2016) Estimate of minimum attenuation level for a TEMPEST shielded enclosure. In Proc. IEEE International Conference on Communications (COMM), 6

  102. Cazanaru D, Szilagyi A, Stoica D, Mazare P, Stoica A, Boteanu A (2010) Shielding screen design optimization. In Proc. IEEE International Conference on Communications (COMM)

  103. Anderson RJ, Kuhn MG (1999) Soft Tempest An Opportunity for NATO. In Information Systems Technology (IST), 4

  104. Tanaka H, Takizawa O, Yamamura A (2004) Evaluation and Improvement of the Tempest Fonts. In Proc. Information Security Applications (WISA), pages 457–469, 8

  105. Tawalbeh L, Houssain H, Al-Somani T (2017) Review of side channel attacks and countermeasures on ecc, rsa, and aes cryptosystems. In Proc. Journal of Internet Technology and Secured Transaction (JITST), volume 6, 4. Available: https://pdfs.semanticscholar.org/fc7c/fca5065504b62a7c279460fb85cc8b1577e7.pdf

  106. Genkin D, Pachmanov L, Pipman I, Tromer E (2015) Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation. In Lecture Notes in Computer Science, pages 207–228

  107. Tehranipoor M, Wang C (2012) Introduction to Hardware Security and Trust. Available: https://link.springer.com/content/pdf/10.1007%2F978-1-4419-8080-9.pdf

  108. Laskar J, Matinpour B, Chakraborty S (2004) Modern Receiver Front-Ends

  109. Gneysu T, Moradi A (2011) Generic side-channel countermeasures for reconfigurable devices. In Cryptographic Hardware and Embedded Systems – CHES, pages 33–48

  110. Suzuki Y, Akiyama Y (2010) Jamming technique to prevent information leakage caused by unintentional emissions of PC video signals. In Proc. IEEE International Symposium on Electromagnetic Compatibility (EMC), 7

  111. Pamula D, Tisserand A (2012) Finite-Field Multipliers with Reduced Activity Variations. In Proc. Arithmetic of Finite Fields (AIFI), 7. Available: https://www.ebook.de/de/product/25495155/arithmetic_of_finite_fields.html

  112. Yao K, Lan S, Xia M, Chen L (2018) Active countermeasure using EMI honeypot against TEMPEST eavesdropping in high-speed signalling. In USNC-URSI Radio Science Meeting (Joint with AP-S Symposium)

  113. Han Y, Etigowni S, Liu H, Zonouz S, Petropulu A. Watch me, but don’t touch me! contactless control flow monitoring via electromagnetic emanations. In Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS)

  114. Sehatbakhsh N, Nazari A, Alam M, Werner F, Zhu Y, Zajic A, Prvulovic M (2019) REMOTE: Robust external malware detection framework by using electromagnetic signals. 10

  115. Batina L, Bhasin S, Jap D, Picek S (2019) CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel. In Proc. 28th USENIX Security Symposium (USENIX Security). Available: https://www.usenix.org/conference/usenixsecurity19/presentation/batina

  116. Brier E, Clavier C, Olivier F (2004) “Correlation Power Analysis with a Leakage Model,” in Proc. Cryptographic Hardware and Embedded Systems (CHES) 1, pp. 16–29

  117. Sugawara T, Cyr B, Rampazzi S, Genkin D, Fu K (2020) “Light commands: Laser-based audio injection on voice-controllable systems,” in 29th USENIX Security Symposium. [Online]. Available: https://lightcommands.com/20191104-Light-Commands.pdf

  118. Goodin D (2013) Meet badBIOS, the mysterious MacPC malware that jumps airgaps. online. [Online]. Available: http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robin Gerzaguet.

Appendix

Appendix

Table 3 Classification of the papers on side-channel attacks (EM stands for ElectroMagnetic)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lavaud, C., Gerzaguet, R., Gautier, M. et al. Whispering Devices: A Survey on How Side-channels Lead to Compromised Information. J Hardw Syst Secur 5, 143–168 (2021). https://doi.org/10.1007/s41635-021-00112-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41635-021-00112-6

Keywords

Navigation