Follow up on the story that wired keyboards could be snooped

echrada

Vista Guru
Snooping on wired keyboards overhyped | Hardware 2.0 | ZDNet.com

The story that wired keyboards could be snooped on caused a fair bit of brouhaha on the blogosphere.

Here’s the background by researchers Martin Vuagnoux and Sylvain Pasini:

To determine if wired keyboards generate compromising emanations, we measured the electromagnetic radiations emitted when keys are pressed. To analyze compromising radiations, we generally use a receiver tuned on a specific frequency. However, this method may not be optimal: the signal does not contain the maximal entropy since a significant amount of information is lost.

Our approach was to acquire the signal directly from the antenna and to work on the whole captured electromagnetic spectrum.

We found 4 different ways (including the Kuhn attack) to fully or partially recover keystrokes from wired keyboards at a distance up to 20 meters, even through walls. We tested 11 different wired keyboard models bought between 2001 and 2008 (PS/2, USB and laptop). They are all vulnerable to at least one of our 4 attacks.

We conclude that wired computer keyboards sold in the stores generate compromising emanations (mainly because of the cost pressures in the design). Hence they are not safe to transmit sensitive information. No doubt that our attacks can be significantly improved, since we used relatively unexpensive equipments.

So, should we be pulling on our tinfoil hats and disconnecting out keyboards? Should we be running to the hills?

Not so fast there …

I’ve watched the two videos posted on these attacks and a few things struck me:

First, this experiment was conducted in a lab with the antenna seemingly close to the keyboard and the the cable between the keyboard and PC carefully straightened out. This all seems very ideal to me.
To me it seemed that the researchers did a lot to eliminate EM noise by using only a notebook. I’d like to see this done in an environment that’s EM noisy.
Anyone else wonder why the keystroke decoding software exits as soon as “trust no one” has been typed? Shouldn’t it still be waiting for more keystrokes?

I’m not worried? Is anyone else?
 

My Computer

System One

  • Manufacturer/Model
    Acer Aspire 5920gmi notebook
    CPU
    Intel Core 2 Duo T7300 2.00GHz
    Memory
    4GB
    Graphics card(s)
    NVIDIA GeForce 8600M GS
    Sound Card
    Realtek
    Screen Resolution
    1280 x 800 x 4294967296 colors
    Internet Speed
    crawl

My Computer

System One

  • Manufacturer/Model
    Calhoun Husker ...
    CPU
    Intel Core 2 Quad
    Motherboard
    ASUS P5Q LGA 775 Intel P45 ATX Intel Motherboard
    Memory
    G.SKILL 4GB (2 x 2GB) 240-Pin DDR2 SDRAM DDR2 1000 (PC2 8000) Dual Channel
    Graphics card(s)
    EVGA 256-P2-N751-TR GeForce 7900 GT 256MB 128-bit GDDR3 PCI
    Sound Card
    Who needs sound?
    Monitor(s) Displays
    Samsung 22 in
    Hard Drives
    Western Digital Caviar SE16 WD6400AAKS 640GB 7200 RPM 16MB Cache SATA 3.0Gb/s
    Case
    Antec Three Hundred Black Steel ATX Mid Tower Computer Case
    Mouse
    Microsoft Wireless
    Keyboard
    Microsoft Wireless
Nope!
 

My Computer

System One

  • Manufacturer/Model
    My Ever Changing Whim!
    CPU
    Intel Core 2 Quad 9650
    Motherboard
    Intel DQ35JO
    Memory
    6GB Corsair DDR2 800
    Graphics card(s)
    ASUS 9800GT Ultimate
    Sound Card
    Onboard
    Monitor(s) Displays
    19 inch Sceptre 19 inch Acer
    Screen Resolution
    1280x1024
    Hard Drives
    1 320GB Seagate SATA 1 250GB Western Digital SATA 1 200GB Maxtor SATA 2x160GB Western Digitals SATA 1 320GB Seagate External 1 120GB Western Digital External 1 80GB Westen Digital External 1 4GB Crucial Flash Drive for Ready Boost
    PSU
    600watt Fortron Source
    Case
    Antec
    Cooling
    Fresh Air
    Mouse
    Razer Diamondback
    Keyboard
    Microsoft Natural Ergonamic 4000
    Other Info
    My main rig runs Vista Ultimate or Server 2008. Depending on which Acronis image I decide to load.
Back
Top