Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2046707.2046770acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Televisions, video privacy, and powerline electromagnetic interference

Published: 17 October 2011 Publication History

Abstract

We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. In addition to being of scientific interest, our findings contribute to the overall debate of whether or not measurements of residential powerlines reveal significant information about the activities within a home. We find that the power supplies of modern TVs produce discernible electromagnetic interference (EMI) signatures that are indicative of the video content being displayed. We measure the stability of these signatures over time and across multiple instances of the same TV model, as well as the robustness of these signatures in the presence of other noisy electronic devices connected to the same powerline.

References

[1]
D. Asonov and R. Agrawal. Keyboard acoustic emanations. In IEEE Symposium on Security and Privacy, 2004.
[2]
M. Backes, M. Dürmuth, and D. Unruh. Compromising reflections -- or -- how to read lcd monitors around the corner. In IEEE Symposium on Security and Privacy, 2008.
[3]
A. Barisani and D. Bianco. Sniffing keystrokes with lasers/voltmeters: Side channel attacks using optical sampling of mechanical energy and power line leakage. In Black Hat Technical Security Conference: USA, 2009.
[4]
R. Briol. Emanations: How to keep your data confidential. In Symposium on Electromagnetic Security for Information Protection, 1991.
[5]
S. S. Clark, J. Sorber, K. Fu, and E. Learned-Miller. Current Events: Compromising Web Privacy by Tapping the Electrical Outlet. Technical Report UM-CS-2011-030, Department of Computer Science, University of Massachusetts Amherst, Amherst, MA, July 2011.
[6]
G. Cohn, S. Gupta, J. Froehlich, E. Larson, and S. Patel. GasSense: Appliance-level, single-point sensing of gas activity in the home. In International Conference on Pervasive Computing, 2010.
[7]
A. Devices. Analog devices power measure ic for smart meters. Analog.com, http://www.analog.com/en/analog-to-digital-converters/energy-measureme%nt/products/index.html, 2010.
[8]
V. Eck. Electromagnetic radiation from video display units: An eavesdropping risk? Computers and Security, 4:269--286, 1985.
[9]
J. Froehlich, E. Larson, T. Campbell, C. Haggerty, J. Fogarty, and S. Patel. HydroSense: Infrastructure-mediated single-point sensing of whole-home water activity. In International Conference on Ubiquitous Computing, 2009.
[10]
S. Gupta, S. Patel, and M. Reynolds. ElectriSense: Single-point sensing using EMI for electrical event detection and classification in the home. In International Conference on Ubiquitous Computing, 2010.
[11]
G. Hart. Advances in nonintrusive appliance load monitoring. In EPRI Information and Automation Conference, 1991.
[12]
History of Tempest. Cryptome, http://cryptome.org/tempest-old.htm, 2000.
[13]
P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology, 1996.
[14]
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Advances in Cryptology, 1999.
[15]
M. Kuhn. Optical time-domain eavesdropping risks of CRT displays. In IEEE Symposium on Security and Privacy, 2002.
[16]
M. Kuhn. Compromising emanations: Eavesdropping risks of computer displays. University of Cambridge Technical Report UCAM-CL-TR-577, 2003.
[17]
M. Kuhn. Electromagnetic eavesdropping risks of flat-panel displays. In Workshop on Privacy Enhancing Technologies, 2004.
[18]
M. Kuhn. Compromising emanations of lcd tv sets. In IEEE International Symposium on Electromagnetic Compatibility - Aug 11--19 (to appear), 2011.
[19]
J. Loughry and D. A. Umphress. Information leakage from optical emanations. ACM Transactions on Information and System Security, 5:262--289, Aug. 2002.
[20]
J. Lynch and L. Tien. Joint comments of the Center for Democracy & Technology and the Electronic Frontier Foundation on proposed policies and findings pertaining to the smart grid. Comments to the the Public Utilities Commission of the State of California, http://www.eff.org/files/CDTEFFJointComment030910.pdf, 2010.
[21]
Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin. Private memoirs of a smart meter. In ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, 2010.
[22]
S. Patel, M. Reynolds, and G. Abowd. Detecting human movement by differential air pressure sensing in HVAC system ductwork: An exploration in infrastructure mediated sensing. In International Conference on Pervasive Computing, 2008.
[23]
S. Patel, T. Robertson, J. Kientz, M. Reynolds, and G. Abowd. At the flick of a switch: Detecting and classifying unique electrical events on the residential power line. In International Conference on Ubiquitous Computing, 2007.
[24]
A. Rial and G. Danezis. Privacy-preserving smart metering. Microsoft Research Technical Report MSR-TR-2010--150, 2010.
[25]
T. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In USENIX Security Symposium, 2007.
[26]
M. R. Spiegel. Theory and Problems of Probability and Statistics, chapter 14 (Correlation Theory). McGraw-Hill, 1992.
[27]
The benefits of smart meters. California Public Utilities Commision, http://www.cpuc.ca.gov/PUC/energy/Demand+Response/benefits.htm, 2010.
[28]
M. Vuoagnoux and S. Pasini. Compromising electromagnetic emanations of wired and wireless keyboards. In USENIX Security Symposium, 2009.
[29]
C. V. Wright, L. Ballard, F. Monrose, and G. M. Masson. Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In USENIX Security Symposium, 2007.

Cited By

View all
  • (2024)Review on Security Defense Technology Research in Edge Computing EnvironmentChinese Journal of Electronics10.23919/cje.2022.00.17033:1(1-18)Online publication date: Jan-2024
  • (2023)Remote attacks on speech recognition systems using sound from power supplyProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620493(4571-4588)Online publication date: 9-Aug-2023
  • (2023)Security Properties of Virtual Remotes and SPOOKing their violationsProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3582834(841-854)Online publication date: 10-Jul-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '11: Proceedings of the 18th ACM conference on Computer and communications security
October 2011
742 pages
ISBN:9781450309486
DOI:10.1145/2046707
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. electromagnetic interference
  2. information leakage
  3. powerline security

Qualifiers

  • Research-article

Conference

CCS'11
Sponsor:

Acceptance Rates

CCS '11 Paper Acceptance Rate 60 of 429 submissions, 14%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)26
  • Downloads (Last 6 weeks)5
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Review on Security Defense Technology Research in Edge Computing EnvironmentChinese Journal of Electronics10.23919/cje.2022.00.17033:1(1-18)Online publication date: Jan-2024
  • (2023)Remote attacks on speech recognition systems using sound from power supplyProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620493(4571-4588)Online publication date: 9-Aug-2023
  • (2023)Security Properties of Virtual Remotes and SPOOKing their violationsProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3582834(841-854)Online publication date: 10-Jul-2023
  • (2023)LeakThief: Stealing the Behavior Information of Laptop via Leakage Current2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)10.1109/SECON58729.2023.10287495(186-194)Online publication date: 11-Sep-2023
  • (2022)AEROKEYProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35172546:1(1-29)Online publication date: 29-Mar-2022
  • (2022)Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance2022 IEEE Security and Privacy Workshops (SPW)10.1109/SPW54247.2022.9833894(312-322)Online publication date: May-2022
  • (2022)Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833773(1440-1457)Online publication date: May-2022
  • (2022)Power IoT System Security Monitoring Based On Power Consumption Side Channel Information2022 5th International Conference on Electronics and Electrical Engineering Technology (EEET)10.1109/EEET58130.2022.00019(59-65)Online publication date: Dec-2022
  • (2021)MayaProceedings of the 48th Annual International Symposium on Computer Architecture10.1109/ISCA52012.2021.00074(888-901)Online publication date: 14-Jun-2021
  • (2020)Leveraging EM Side-Channel Information to Detect Rowhammer Attacks2020 IEEE Symposium on Security and Privacy (SP)10.1109/SP40000.2020.00060(729-746)Online publication date: May-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media