A. Boitan, Razvan Bartusica, M. Popescu, Bîndar Valerică, O. Fratu
{"title":"无线键盘通信拦截-方便与安全之间的平衡","authors":"A. Boitan, Razvan Bartusica, M. Popescu, Bîndar Valerică, O. Fratu","doi":"10.1109/ICCOMM.2018.8484812","DOIUrl":null,"url":null,"abstract":"Wireless devices are being used more often today and anyone may ask if they are safe in terms of the confidentiality of the information generated or handled by them. In this paper we analyze the electromagnetic emissions generated by two wireless keyboards, one that does use data encryption and one that does not. It will be demonstrated that it is possible to restore the keystroke information if no encryption is used, and that data encryption is the only shield of protection against a possible attacker.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Wireless Keyboards Communication Interception - The Balance Between Convenience and Security\",\"authors\":\"A. Boitan, Razvan Bartusica, M. Popescu, Bîndar Valerică, O. Fratu\",\"doi\":\"10.1109/ICCOMM.2018.8484812\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless devices are being used more often today and anyone may ask if they are safe in terms of the confidentiality of the information generated or handled by them. In this paper we analyze the electromagnetic emissions generated by two wireless keyboards, one that does use data encryption and one that does not. It will be demonstrated that it is possible to restore the keystroke information if no encryption is used, and that data encryption is the only shield of protection against a possible attacker.\",\"PeriodicalId\":158890,\"journal\":{\"name\":\"2018 International Conference on Communications (COMM)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Communications (COMM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCOMM.2018.8484812\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Communications (COMM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCOMM.2018.8484812","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Wireless Keyboards Communication Interception - The Balance Between Convenience and Security
Wireless devices are being used more often today and anyone may ask if they are safe in terms of the confidentiality of the information generated or handled by them. In this paper we analyze the electromagnetic emissions generated by two wireless keyboards, one that does use data encryption and one that does not. It will be demonstrated that it is possible to restore the keystroke information if no encryption is used, and that data encryption is the only shield of protection against a possible attacker.