Vol. 41
Latest Volume
All Volumes
PIERC 143 [2024] PIERC 142 [2024] PIERC 141 [2024] PIERC 140 [2024] PIERC 139 [2024] PIERC 138 [2023] PIERC 137 [2023] PIERC 136 [2023] PIERC 135 [2023] PIERC 134 [2023] PIERC 133 [2023] PIERC 132 [2023] PIERC 131 [2023] PIERC 130 [2023] PIERC 129 [2023] PIERC 128 [2023] PIERC 127 [2022] PIERC 126 [2022] PIERC 125 [2022] PIERC 124 [2022] PIERC 123 [2022] PIERC 122 [2022] PIERC 121 [2022] PIERC 120 [2022] PIERC 119 [2022] PIERC 118 [2022] PIERC 117 [2021] PIERC 116 [2021] PIERC 115 [2021] PIERC 114 [2021] PIERC 113 [2021] PIERC 112 [2021] PIERC 111 [2021] PIERC 110 [2021] PIERC 109 [2021] PIERC 108 [2021] PIERC 107 [2021] PIERC 106 [2020] PIERC 105 [2020] PIERC 104 [2020] PIERC 103 [2020] PIERC 102 [2020] PIERC 101 [2020] PIERC 100 [2020] PIERC 99 [2020] PIERC 98 [2020] PIERC 97 [2019] PIERC 96 [2019] PIERC 95 [2019] PIERC 94 [2019] PIERC 93 [2019] PIERC 92 [2019] PIERC 91 [2019] PIERC 90 [2019] PIERC 89 [2019] PIERC 88 [2018] PIERC 87 [2018] PIERC 86 [2018] PIERC 85 [2018] PIERC 84 [2018] PIERC 83 [2018] PIERC 82 [2018] PIERC 81 [2018] PIERC 80 [2018] PIERC 79 [2017] PIERC 78 [2017] PIERC 77 [2017] PIERC 76 [2017] PIERC 75 [2017] PIERC 74 [2017] PIERC 73 [2017] PIERC 72 [2017] PIERC 71 [2017] PIERC 70 [2016] PIERC 69 [2016] PIERC 68 [2016] PIERC 67 [2016] PIERC 66 [2016] PIERC 65 [2016] PIERC 64 [2016] PIERC 63 [2016] PIERC 62 [2016] PIERC 61 [2016] PIERC 60 [2015] PIERC 59 [2015] PIERC 58 [2015] PIERC 57 [2015] PIERC 56 [2015] PIERC 55 [2014] PIERC 54 [2014] PIERC 53 [2014] PIERC 52 [2014] PIERC 51 [2014] PIERC 50 [2014] PIERC 49 [2014] PIERC 48 [2014] PIERC 47 [2014] PIERC 46 [2014] PIERC 45 [2013] PIERC 44 [2013] PIERC 43 [2013] PIERC 42 [2013] PIERC 41 [2013] PIERC 40 [2013] PIERC 39 [2013] PIERC 38 [2013] PIERC 37 [2013] PIERC 36 [2013] PIERC 35 [2013] PIERC 34 [2013] PIERC 33 [2012] PIERC 32 [2012] PIERC 31 [2012] PIERC 30 [2012] PIERC 29 [2012] PIERC 28 [2012] PIERC 27 [2012] PIERC 26 [2012] PIERC 25 [2012] PIERC 24 [2011] PIERC 23 [2011] PIERC 22 [2011] PIERC 21 [2011] PIERC 20 [2011] PIERC 19 [2011] PIERC 18 [2011] PIERC 17 [2010] PIERC 16 [2010] PIERC 15 [2010] PIERC 14 [2010] PIERC 13 [2010] PIERC 12 [2010] PIERC 11 [2009] PIERC 10 [2009] PIERC 9 [2009] PIERC 8 [2009] PIERC 7 [2009] PIERC 6 [2009] PIERC 5 [2008] PIERC 4 [2008] PIERC 3 [2008] PIERC 2 [2008] PIERC 1 [2008]
2013-07-01
Novel Method to Detect and Recover the Keystrokes of Ps/2 Keyboard
By
Progress In Electromagnetics Research C, Vol. 41, 151-161, 2013
Abstract
Computer keyboards are often used to transmit confidential data such as passwords. The sensitive information such as keystrokes could be recovered by using the electromagnetic (EM) waves from the electronic components of the keyboard. In this paper, we have investigated the information leakage on the ground line of the PS/2 serial cable due to crosstalk and radiative coupling. The coupling principles are analyzed firstly. And then, through the experiments we found that the signals of keystrokes could leak to the ground line network which could then be detected on the other power outlets whose share the same electric line. Lastly, the eavesdropping experiments demonstrated that the keystrokes could be reproduced on the other places of the ground line network with no trace.
Citation
Yu-Lei Du, Ying-Hua Lu, and Jin-Ling Zhang, "Novel Method to Detect and Recover the Keystrokes of Ps/2 Keyboard," Progress In Electromagnetics Research C, Vol. 41, 151-161, 2013.
doi:10.2528/PIERC13042302
References

1. CISPR 22-Edition 5.2 "Information technology equipment-radio disturbance characteristics-limits and methods of measurement,", International Electro-technical Commission (IEC), 2006.
doi:10.1109/TEMC.2010.2103562

2. Tosaka, T., Y. Yamanaka, and K. Fukunaga, "Method for determining whether or not information is contained in electromagnetic disturbance radiated from a PC display," IEEE Transactions on Electromagnetic Compatibility, Vol. 53, No. 2, 318-324, 2011.

3. Kuhn, M. G., "Compromising emanations: Eavesdropping risks of computer displays,", Technical Report 577, Computer Laboratory, University of Cambridge, 2003.
doi:10.1016/0167-4048(85)90046-X

4. Van Eck, W., "Electromagnetic radiation from video display units: An eavesdropping risk?," Computers & Security, Vol. 4, No. 4, 269-286, 1985.
doi:10.2528/PIERC09030907

5. Sekiguchi, H. and S. Seto, "Measurement of computer RGB signals in conducted emission on power leads," Progress In Electromagnetics Research C, Vol. 7, 51-64, 2009.

6. Du, Y. L., Y. H. Lu, F. Mo, and N. Zhang, "A method for choosing the best frequency range for receiving the electromagnetic compromising emanations from a PC display," Journal of Beijing University of Posts and Telecommunications, Vol. 36, No. 1, 54-58, 2013.

7. Du, Y. L., Y. H. Lu, J. L. Zhang, and Q. Cui, "Estimation of eavesdropping distance from conducted emission on network cable of a PC," 2012 6th Asia-Pacific Conference on Environmental Electromagnetics (CEEM), 347-350, Beijing, China, Nov. 6-9, 2012.

8. Hayashi, Y. I., N. Homma, T. Mizuki, et al. "Efficient evaluation of EM radiation associated with information leakage from cryptographic devices," IEEE Transactions on Electromagnetic Compatibility, Vol. 55, No. 99, 1-9, 2012.

9. Vuagnoux, M. and S. Pasini, "Compromising electromagnetic emanations of wired and wireless keyboards," The 18th USENIX Security Symposium, 1-16, 2009.

10. Vuagnoux, M. and S. Pasini, "An improved technique to discover compromising electromagnetic emanations," Proc. 2010 IEEE Int. Symp. EMC, Florida, USA, Jul. 2010.

11. Wang, L. T. and B. Yu, "Research on the compromising electromagnetic emanations of PS/2 keyboard," Proceedings of the 2012 International Conference on Communication, Electronics and Automation Engineering, 23-29, Springer, Berlin, Heidelberg, 2013.

12. Backes, M., M. Durmuth, and D. Unruh, "Compromising reflections-or-how to read lcd monitors around the corner," IEEE Symposium on Security and Privacy (2008), 158-169, Oakland, CA, 2008.

13. Asonov, D. and R. Agrawal, "Keyboard acoustic emanations," Proceedings. 2004 IEEE Symposium on Security and Privacy, 3-11, IEEE Computer Society, May 9-12, 2004.

14. Berger, Y., A. Wool, and A. Yeredor, "Dictionary attacks using keyboard acoustic emanations," ACM Conference on Computer and Communications Security (2006), 245-254, New York, USA, 2006.

15. Zhang, L., F. Zhou, and J. D. Tygar, "Keyboard acoustic emanations revisited," ACM Conference on Computer and Communications Security (2005), 373-382, New York, USA, 2005.

16. Paul, C. R., Introduction to Electromagnetic Compatibility, Wiley, New York, 1992.
doi:10.1109/15.18789

17. Paul, C. R., "A comparison of the contribution of common-mode and differential-mode currents in radiated emission," IEEE Transactions on Electromagnetic Compatibility, Vol. 31, No. 2, 189-193, 1989.