BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Who by sound and who by ground\, who by pin and who by skin: side-
 channel key extraction from PCs - Eran Tromer\, Tel Aviv University
DTSTART:20140801T150000Z
DTEND:20140801T154500Z
UID:TALK52722@talks.cam.ac.uk
CONTACT:Markus Kuhn
DESCRIPTION:Can secret information be extracted from personal computers by
  measuring their physical properties from the outside? What would it take 
 to extract whole keys from such fast and complex devices? We present myria
 ds way to do so\, by analyzing signals acquired through microphones\, ante
 nnas\, paper clips\, or even the touch of a human hand. The talk will disc
 uss the attacks' principles.\n\nFor example\, many computers emit a high-p
 itched noise during operation\, due to vibration of electronic components.
  These acoustic emanations\, we\nshow\, can be exploited to extract 4096-b
 it RSA secret keys from the popular GnuPG software\, within an hour -- jus
 t by pointing a microphone at the computer while it is decrypting carefull
 y-crafted ciphertexts.\n\nAdditional attacks are based on the observation 
 that the "ground" electric potential\, in many computers\, fluctuates in a
  computation-dependent way. An attacker can measure this signal by touchin
 g the computer's chassis\, or the shield on the remote end of Ethernet\, V
 GA or USB cables. Secret keys can then be extracted\, sometimes within sec
 onds.\n\n\nJoint works with Daniel Genkin\, Itamar Pipman and Adi Shamir. 
 For further information on the acoustic key extraction\, see http://www.cs
 .tau.ac.il/~tromer/acoustic .\n
LOCATION:Computer Laboratory\, William Gates Building\, Room FW11
END:VEVENT
END:VCALENDAR
