Menu
Using spellcheck? Electromagnetic fields could reveal your writing

Using spellcheck? Electromagnetic fields could reveal your writing

Georgia Tech is studying better software and hardware designs to prevent electronic snooping

Georgia Tech researchers Alenka Zajic and Milos Prvulovic use an AM/FM radio to pick up side-channel signals from a cell phone, which could be used to learn what computations are being done by the device.

Georgia Tech researchers Alenka Zajic and Milos Prvulovic use an AM/FM radio to pick up side-channel signals from a cell phone, which could be used to learn what computations are being done by the device.

It has long been known that subtle electronic fields and noises emitted by computers can reveal clues about your activity, a powerful spying method that can be done from a few feet away.

These so-called "side-channel signals" can be collected by antennas or microphones and through analysis could reveal sensitive data such as encryption keys.

It's not known if spy agencies are already using these methods, but the many academic studies outlining potential attacks would suggest it's probably a growing part of signals intelligence.

Researchers from the Georgia Institute of Technology have embarked on a three-year project to figure out how these electronic signal leaks could be prevented by redesigning hardware and software.

Milos Prvulovic, an associate professor with Georgia Tech's School of Computer Science, said his team has been looking for potential vulnerabilities in applications or hardware designs that might make such signals collection easier.

"I don't want to demonstrate an attack in order to be able to defend against it," Prvulovic said in a phone interview Thursday. "Then, the defenders are always playing catch up with the attackers."

Much effort has gone into trying to stop side-channel attacks from being successful against specific pieces of code, such as a cryptographic kernel.

But much less work has been done in leakage at a broader architectural level, such as what features are the strongest leakers, they write in their research paper.

To look into this, the researchers developed a new metric called "Signal Available to Attacker" (SAVAT), which measures the side-channel signal generated by a single instruction difference when a program is executing.

SAVAT quantifies the side channel signal's dependence on instruction-level differences. The metric allows programmers to modify their code to prevent such high differences from being detected, especially when processes are underway that deal with sensitive information.

They looked at the electronic emanations from three Windows XP laptops running 11 different instructions, as well as some mobile devices.

As expected, some signals were stronger than others depending on what components were involved. Two instructions executed on-chip tend to be quieter than a signal generated by an on-chip instruction that uses off-chip memory, according to their research paper.

Collecting those signal differences can reveal what an application is doing and could be used, for example, to obtain cryptographic keys without trying to break the encrypted content in other ways, Prvulovic said.

Over the years, people have become very good at collecting signals and matching that to a person's activity. During their work, Prvulovic and his colleagues discovered an interesting peculiarity about spellcheckers, which isn't mentioned in their paper.

There's not a lot of signal that comes from a computer running a word processing program that has spellcheck turned off, Prvulovic said. It's relatively difficult for an attacker to tell what key is pressed.

But turn spellcheck on, and things get really noisy. The signals can be picked up by an AM radio, Prvulovic said. In fact, the processing is so loud, it's audible: a person can hear it.

Each keystroke causes the spellchecker to look up the word in a dictionary to try to catch a mistake and flag it.

"It turns out that spellchecking is orders of magnitude more activity than you would normally get for just a simple key press," he said. "Modern software does a lot of stuff that is convenient but horribly computationally intensive. That creates differences that can be picked up."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Georgia Institute of Technologysecurity

Slideshows

Top 50 defining moments of the New Zealand channel in 2016

Top 50 defining moments of the New Zealand channel in 2016

Reseller News looks back on a tumultuous 12 months for the New Zealand channel, assessing the fallout from a year of sizeable industry change. Whether it be local or global mergers and acquisitions, distribution deals or job changes, the channel that started the year differs somewhat to the one set to finish it - Reseller News assesses the key moments that made 2016.​

Top 50 defining moments of the New Zealand channel in 2016
​Hewlett Packard Enterprise honours high achieving NZ channel

​Hewlett Packard Enterprise honours high achieving NZ channel

Hewlett Packard Enterprise honoured its top performing Kiwi partners at the second running of its HPE Partner Awards in New Zealand, held at a glitzy ceremony in Auckland. Recognising excellence across eight categories - from distributors to resellers - the tech giant celebrated its first year as a standalone company, following its official split from HP in 2015.

​Hewlett Packard Enterprise honours high achieving NZ channel
Nutanix treats channel partners to Christmas cruise

Nutanix treats channel partners to Christmas cruise

Nutanix recently took to the seas for a Christmas Cruise around Sydney Harbour with its Australia and New Zealand staff, customers and partners to celebrate a stellar year for the vendor. With the sun out, they were all smiles and mingled over drinks and food.

Nutanix treats channel partners to Christmas cruise
Show Comments