Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
First, we show how reflections in the user's eye can be exploited for spying on confidential data. Second, we investigate to what extent monitor images can be ...
First, we show how reflections in the user's eye can be exploited for spying on confidential data. Second, we investigate to what extent monitor images can be ...
First, we show how reflections in the user's eye can be exploited for spying on confidential data. Second, we investigate to what extent monitor images can be ...
This work shows how reflections in the user's eye can be exploited for spying on confidential data, and investigates to what extent monitor images can be ...
First, we show how reflections in the user's eye can be exploited for spying on confidential data. Second, we investigate to what extent monitor images can be ...
It showed how to exploit tiny reflections in a variety of objects to spy on confidential data displayed on a computer monitor. Appropriate objects are typically.
Jul 27, 2017 · Item Type: Conference or Workshop Item (A Paper) (Paper). Additional Information: pub_id: 346 Bibtex: backes09tempestb URL date: None.
People also ask
Tempest in a teapot: Compromising reflections revisited. M Backes, T Chen, M Dürmuth, HPA Lensch, M Welk. 2009 30th IEEE Symposium on Security and Privacy ...
Tempest in a Teapot: Compromising Reflections Revisited pp. 315-327. Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers pp ...
Tempest in a teapot: Compromising reflections revisited. 2009, Proceedings - IEEE Symposium on Security and Privacy. Compromising reflections - Or - How to ...