Back to Results
First PageMeta Content
Surveillance / Signals intelligence / Computer keyboard / TEMPEST / Computer security / Computer security compromised by hardware failure / Digital / Side channel attack / Anechoic chamber / Espionage / Electronic engineering / Electronics


Compromising Electromagnetic Emanations of Wired and Wireless Keyboards Martin Vuagnoux EPFL, Lausanne, Switzerland [removed]
Add to Reading List

Document Date: 2011-07-09 03:43:22


Open Document

File Size: 1,35 MB

Share Result on Facebook

Company

GNU Radio software / EMC / GNU Radio / Dynamic Sciences International Inc. / Raw signal / Tektronix / /

Country

United States / Vietnam / /

/

Facility

Ho Chi Minh trail / GNU Radio library / PC tower / USB port / /

IndustryTerm

software band-pass / software radio libraries / wire networks / software radio / peak-detection algorithm / wireless communication protocol / real time / even wireless keyboards / communication protocol / teletypewriter communications / signal processing / real time keystroke recovery / static carrier signals / electric systems / exhaustive search / peak detection algorithm / carrier-based modulation / energy / input device / wireless keyboards / software library / cheaper and open-source solution / driver chip / wireless data / electromagnetic energy / detector chip / e-banking money transfer / Wireless Keyboards Martin Vuagnoux EPFL / hardware devices / carrier signals / software vulnerabilities / wireless router / smart solution / potential information leaking devices / wireless communication / naive solution / wireless keyboard / /

MusicGroup

MHz / /

OperatingSystem

GNU/Linux / GNU / /

Organization

Adjacent Office / National Security Agency / American Army / Federal Communications Commission / /

Person

Sylvain Pasini / Martin Vuagnoux / /

Position

driver / keyboard controller / researcher / General / open collector / controller / /

Product

Tektronix TDS5104 / /

ProgrammingLanguage

E / DC / /

RadioStation

Radio Frequency Interferences / /

Technology

alpha / 8-bit processor / radiation / ADC / broadband / PS/2 communication protocol / 802.11n wireless router / Linux / peak detection algorithm / amplitude modulation / secret key / IEEE 1394 / PS/2 protocol / Ethernet / wireless communication protocol / Radio Frequency / detector chip / frequency modulation / driver chip / peak-detection algorithm / Gigabit Ethernet / /

SocialTag