Whispering Devices: A Survey on How Side-channels Lead to Compromised Information
- 20 March 2021
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Hardware and Systems Security
- Vol. 5 (2), 143-168
- https://doi.org/10.1007/s41635-021-00112-6
Abstract
No abstract availableKeywords
This publication has 76 references indexed in Scilit:
- NOVEL METHOD TO DETECT AND RECOVER THE KEYSTROKES OF PS/2 KEYBOARDProgress in Electromagnetics Research C, 2013
- On Covert Acoustical Mesh Networks in AirJournal of Communications, 2013
- Video information recovery from EM leakage of computers based on storage oscilloscopeFrontiers of Electrical and Electronic Engineering in China, 2010
- Evaluation and Improvement of the Tempest FontsLecture Notes in Computer Science, 2005
- Correlation Power Analysis with a Leakage ModelLecture Notes in Computer Science, 2004
- Analysis of dissipation energy of switching digital CMOS gates with coupled outputsMicroelectronics Journal, 2003
- Information leakage from optical emanationsACM Transactions on Information and System Security, 2002
- Differential fault analysis of secret key cryptosystemsLecture Notes in Computer Science, 1997
- The threat of information theft by reception of electromagnetic radiation from RS-232 cablesComputers & Security, 1990
- Electromagnetic radiation from video display units: An eavesdropping risk?Computers & Security, 1985