Signal-analysis is a side-channel attack that involves identifying information in electromagnetic signals emitted from a system.
Questions tagged [signal-analysis]
11 questions
8
votes
5 answers
How might the BBC snoop on wi-fi usage?
It's just been reported that the BBC plan to deploy wi-fi detection vans to identify users who are streaming content from their internet service (BBC iPlayer) without a TV license. For example, see The Telegraph.
How might they achieve this? What…
lemon
- 183
- 4
6
votes
2 answers
Electromagnetic induction attacks - reverse TEMPEST?
I know that electromagnetic emissions from a device can be used to extract information from a system, e.g. TEMPEST or Van Eck phreaking.
I also know it's possible to induce a signal into a communications channel using electromagnetic induction, e.g.…
Polynomial
- 132,208
- 43
- 298
- 379
6
votes
6 answers
Crash a computer using waves or similar techniques?
I am trying to prevent a potential attack, by first learning how to perform it.
Pretend there is a cheap £20 - £50 computer, which an attacker with physical access to wishes to crash. This computer will remain plugged into the power (electric going…
k1308517
- 1,272
- 14
- 27
5
votes
1 answer
What buses carrying sensitive information on a running computer are vulnerable to sniffing?
Has there been any research on what buses in a computer can be analyzed while they are live, without rebooting the system to insert a proxy device? For example, I imagine I2C would be very easy to sniff because the wires are exposed, and because the…
forest
- 64,616
- 20
- 206
- 257
4
votes
1 answer
Detect air signals
Is it at all possible to detect all air type signals for a given location? For example, if I wanted to get a list of all air signals (i.e. wifi, bluetooth, radio, 3g, 4g, and all other air type signals, gps etc) going into and out of a building, is…
oshirowanen
- 705
- 3
- 10
- 21
4
votes
2 answers
Converting sound to keystrokes: can I actually try it out?
I heard that there are ways to tell which keys you press based on your laptop microphone. Is there a project that I could run as a proof of concept to actually experience that on my own?
d33tah
- 6,524
- 8
- 38
- 60
2
votes
0 answers
How to identify the communication protocol used in a wireless device?
I really hope that this is the right place to ask.
I need to analyze a baby monitor for any security or privacy weaknesses.
The spec sheet of the baby monitor says, that it uses the ISM 2400~2483.5 MHz bands to transfer video and audio information…
Tofulicious
- 21
- 1
1
vote
1 answer
Is it possible detect a device using a 3G connection?
Someone has a hidden smartphone and are using the internet in a 3G connection.
Can I
find where is he? Maybe using a signal detector.
find who is he? Maybe know the MAC number.
just find if someone is using 3G in that place?
Rodrigo
- 317
- 1
- 3
- 13
1
vote
1 answer
Monitor with two simultaneous, seperate inputs: can an OS read from both inputs?
For example, if you have two computers connected to one monitor, at the same time: can the visuals being sent from computer #1 to the monitor be received by computer #2 ? In any kind of simple way ?
I am aware there are more niche vulnerablities in…
j-deer
- 19
- 1
0
votes
1 answer
Remote monitoring of key strokes — is an RF retro reflector required?
Is it possible to remotely monitor key strokes on a laptop or is an RF retro reflector required?
If so, where would be the most likely location such a device would be placed?
Nanya
- 1
- 1
-2
votes
1 answer
How can I know if any cell phones other than a given set are turned on in the nearby area?
I am searching for a solution to identify phones simply by the signals it emits.
Imagine a signal receiver in a room, then I want to know which people are using phones nearby. I don't care what they are used for, just the fact that they are turned…