element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Publications
  • Learn
  • More
Publications
Blog Hacking Laptops Using a Device Hidden in Pita Bread
  • Blog
  • Documents
  • Events
  • Files
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Publications to participate - click to join for free!
  • Share
  • More
  • Cancel
Group Actions
  • Group RSS
  • More
  • Cancel
Engagement
  • Author Author: GardenState
  • Date Created: 7 Jul 2015 8:05 PM Date Created
  • Views 814 views
  • Likes 1 like
  • Comments 4 comments
Related
Recommended

Hacking Laptops Using a Device Hidden in Pita Bread

GardenState
GardenState
7 Jul 2015

image

image

With the population of mobile devices such as laptops and tablets increasing like jackrabbits on a fertility drug, organizations are increasingly implementing bring-your-own device (BYOD) policies in the workplace to gain a competitive edge and reduce costs. But the benefits of mobility can be lost if laptops and tablets are not adequately protected against security threats.

 

Recently a four-man team from Tel Aviv University’s LEISec (Laboratory for Experimental Information Security) proved one could hack these devices by nonintrusively measuring electromagnetic emanations for a few seconds from a distance of 50 cm., using cheap components that simply monitor the signals given off when a nearby device’s CPU was processing data. And they did so using a device small enough to be concealed within a serving of pita bread.


The key factor in their efforts to see if they could steal data was the discovery that different data crunching operations in a computer--such as decrypting files or playing games--had a characteristic pattern of radio activity. The CPU’s different power demands while it was working gave further rise to these tell-tale signals. The attack sent a few carefully-crafted ciphertexts, and when these are decrypted by the target computer, they triggered the occurrence of specially-structured values inside the decryption software. These special values caused observable fluctuations in the electromagnetic field surrounding the laptop, in a way that depends on the pattern of key bits (specifically, the key-bits window in the exponentiation routine). The secret key can be deduced from these fluctuations, through signal processing and cryptoanalysis.


The attack can be executed using a consumer-grade radio receiver or a Software Defined Radio USB dongle. After demonstrating that the attack worked in the lab, the group created a mobile version called the Portable Instrument for Trace Acquisition, or PITA for short. Assembly of the PITA device required the purchase of an SDR device. The leakage signal is modulated around a carrier around 1.7 MHz, located in the range of the commercial AM radio frequency band. The researchers also managed to use a plain consumer-grade radio receiver to acquire the desired signal. They then recorded the signal by connecting it to the microphone input of an HTC EVO 4G smartphone.

 

During their follow-up test, they were able to prove that their technology worked from a distance of about a half meter, grabbing keys used in several widely used encryption programs and algorithms used to protect data. Popular implementations of RSA and ElGamal encryptions are vulnerable to this attack, including those that implement the decryption using modern exponentiation algorithms. The team successfully extracted keys from laptops of various models running GnuPG (a popular open source encryption software implementing the OpenPGP standard).


The group will formally present their findings at the Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2015 in September.

  • Sign in to reply

Top Comments

  • michaelkellett
    michaelkellett over 10 years ago +1
    This regurgitation of news from elsewhere is just so boring - the same item is "re-tweeted" by Cabe elsewhere - 20% of E14's front page blog highlighting space wasted on mindless copying. If we wanted…
  • michaelkellett
    michaelkellett over 10 years ago in reply to cstanton

    Online and print magazines and journals, dozens of manufacturers' newsletters, newsnet, etc.

    The stuff that Cabe and GardenState post is almost all based on press releases and appears in the US based online magazines.

    What I find so infuriating about it on E14 (and very slightly less so in the online mags where I expect no better) is the lack of any critical comment.

    The article above is a case in point -  it's absolute tosh, drivel (choose you own word).

     

    In the article it says:

     

    "Recently a four-man team from Tel Aviv University’s LEISec (Laboratory for Experimental Information Security) proved one could hack these devices by nonintrusively"


    Recently !!!!!!


    As this WIKI article shows there were regulations about protecting equipment from this kind of hack in 1981 - 35 years ago.


    https://en.wikipedia.org/wiki/Tempest_%28codename%29


    I would have hoped for some critical appraisal of the (very silly) TA uni press release.


    (sorry about the font change - can't be bothered to wrestle with the E14 editor.)


    MK



    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • cstanton
    cstanton over 10 years ago in reply to michaelkellett

    Where do you get your technical news from?

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • balearicdynamics
    balearicdynamics over 10 years ago in reply to michaelkellett

    Regurgitation is the perfect word describing this. Perfectly agree Mike!

     

    Enrico

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • michaelkellett
    michaelkellett over 10 years ago

    This regurgitation of news from elsewhere is just so boring - the same item is "re-tweeted" by Cabe elsewhere - 20% of E14's front page blog highlighting space wasted on mindless copying. If we wanted that sort of stuff we'd fllow you on Twitter.

     

    MK

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • More
    • Cancel
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube