POSTER: Recovering Songs from a Hanging Light Bulb
Abstract
References
Index Terms
- POSTER: Recovering Songs from a Hanging Light Bulb
Recommendations
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityTwo main classes of optical TEMPEST attacks against the confidentiality of information processed/delivered by devices have been demonstrated in the past two decades; the first class includes methods for recovering content from monitors, and the second ...
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityAlthough power LEDs have been integrated in various devices that perform cryptographic operations for decades, the cryptanalysis risk they pose has not yet been investigated. In this paper, we present optical cryptanalysis, a new form of cryptanalytic ...
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
AbstractSide-channels are unintended pathways within target systems that leak internal information, exploitable via side-channel attack techniques that extract the target information, compromising the system’s security and privacy. Side-channel attacks ...
Comments
Information & Contributors
Information
Published In

- General Chairs:
- Yongdae Kim,
- Jong Kim,
- Program Chairs:
- Giovanni Vigna,
- Elaine Shi
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 260Total Downloads
- Downloads (Last 12 months)33
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in