3 points

The part about hacking Galaxy S8 keys by looking at a speaker connected to same usb… I think it’s very far fetched.

S8 has a battery that is constantly charged by usb cable. When you unlock the phone, power draw doesn’t change except maybe for a brief second when key is entered.

permalink
report
reply
2 points

I’ve read the paper, it’s really very cool. However there is nothing to worry about in real life. They captured thousands of uses of a smartcard and then used statistical analysis to gleen data used to attack a protocol with known vulnerabilities. In another setup they had a phone right up against the power led, using the roller shutter effect to collect a single point of data at really high speed. The whole thing also depends on a shitty power supply with a led in the main path. Most power supplies these days don’t have such a led and if they do it’s not always the case they leak data like this.

The circumstances that allow this to work aren’t likely to occur in real life. Even if everything is just right, it still requires a way to collect thousands of samples to do the statistical analysis. And then also requires a scheme with known specific vulnerabilities to work.

Very cool research, but don’t worry about taping off al your power leds for security reasons.

permalink
report
reply
1 point

There was a story like this in Zalewsky’s book Silence on the Wire. Not as technically sophisticated, of course. Great read if you’re into side channel attacks.

permalink
report
reply
5 points
permalink
report
reply
2 points

I think I recall reading about this one too. There are all kinds of ways processors and devices leak information. If you have the time and access you can correlate a lot of things to specific hardware and software operations.

I remember hearing something about a typewriter bug that is tuned to determine the key pressed by the particular acoustic signature of each key press. These kinds of outside-the-box solutions really interest me.

EMI and crosstalk is another area where information can leak and there are already snooping devices that work using that.

permalink
report
parent
reply
2 points

The concept of this is cool, but it feels strictly academic. When I read about this from another article it said the smart card had to be filmed for 60+ minutes of key exchange time. A normal key exchange is a fraction of a second. The ideal circumstances needed for this just don’t exist in the real world…

permalink
report
reply

Cybersecurity

!cybersecurity@sh.itjust.works

Create post

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Community stats

  • 1.8K

    Monthly active users

  • 1.4K

    Posts

  • 3.2K

    Comments