Compromising Reflections
Compromising Reflections
or
How to Read LCD Monitors Around the Corner
Michael Backes
Saarland University and
Max Planck Institute for Software Systems
Saarbr
ucken, Germany
backes@cs.uni-sb.de
Markus D
urmuth
Dominique Unruh
Saarland University
Saarbr
ucken, Germany
{duermuth,unruh}@cs.uni-sb.de
Abstract
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent
LCD monitors. Our technique exploits reections of
the screens optical emanations in various objects that
one commonly nds in close proximity to the screen and
uses those reections to recover the original screen content. Such objects include eyeglasses, tea pots, spoons,
plastic bottles, and even the eye of the user. We
have demonstrated that this attack can be successfully
mounted to spy on even small fonts using inexpensive,
o-the-shelf equipment (less than 1500 dollars) from a
distance of up to 10 meters. Relying on more expensive equipment allowed us to conduct this attack from
over 30 meters away, demonstrating that similar attacks are feasible from the other side of the street or
from a close-by building. We additionally establish theoretical limitations of the attack; these limitations may
help to estimate the risk that this attack can be successfully mounted in a given environment.
1. Introduction
Side-channel attacks are a particularly salient approach for spying on condential data. As early as in
1985, electrical emanations of CRT screens were successfully exploited to reconstruct the screens content
from a distance [12]. This attack was further rened in
diverse variations of dierent levels of sophistication,
e.g., emanations from the cable connecting an LCD
screen to the computer were successfully abused to recover the content of the screen [6]. All these attacks are
grounded on the idea that an unexpected emanation of
1
Figure 1. Image taken with a macro lens from short distance; the distance between the eye and the
monitor was reduced for demonstration. Readability is essentially limited by the camera resolution.
1.2. Outline
2. An Optics Primer
We start by reviewing the relevant parameters of the
optical system and describe their inuence on image
quality. This allows us to better understand our experimental results, and it will provide the basis for deriving lower bounds on the resources that are required to
mount the attack.
2
r
1
a10 .
telescope
observer
intermediate
virtual image
f1
camera
okular
front lens
f1
f2 f2
u2
...
u0
u1
f0
u3
reflecting
surface
b0
intermediate
image
virtual
image
...
d=a1
b1
a2
b2
a0
monitor
Figure 3. Size and location of the reflected image. The curvature of the sphere in the left part of the
figure is exaggerated for illustration.
Figure 5. Reflections in a tea pot, taken from a distance of 10m. The 18pt font is readable from the
reflection.
Figure 6. Reflections in two other tea pots, taken from a distance of 5m. The 18pt font is readable
from the reflection in the left picture, and almost readable in the right picture.
Figure 7. Reflection of a Word document with small 12pt font size in a tea pot, taken from a distance
of 5m. The 12pt font is readable from the reflection.
Figure 8. Image taken with the refractor telescope from a distance of 3.5m, produced with an exposure time of one second.
Figure 9. Image taken with a macro lens from very short distance, with realistic distance between
the monitor and the eye. Readability is limited by the resolution of the camera.
Figure 10. Reflections in two different pairs of glasses, taken from a distance of 5m. Both the inner
side and the outer side of glasses produce reflections. The 18pt font is readable from the reflection.
Figure 11. Reflections in an empty wine glass, taken from a distance of 5m. Reflections occur on
both sides of the glass. The 18pt font is readable from the reflection.
Figure 12. Reflections in a 0.5l plastic Coca-Cola bottle, taken from a distance of 5m. Because of the
irregular surface, only parts of the text are readable.
Reecting objects
(radius r)
Tea pot (70mm)
Tea pot (70mm)
Human eye (8mm)
Human eye (8mm)
Human eye (8mm)
Distance d
to the camera
5m
10m
2m
5m
10m
Minimal
aperture D
16.6cm
33.2cm
62cm
155cm
310cm
Table 1. Some concrete values for the minimal aperture D needed to capture the full resolution of 1024 pixels.
We now present experimental results using more expensive equipment: a Dobson telescope of excellent
quality with mirror diameter D = 60cm and focal
length f = 2.6m. A used telescope sells for about
19000 Euros (approx. 27500 dollars). The telescope
is shown in Figure 16, along with an image of the reections in a tea pot from a distance of 30 meters. The
quality of the captured image is compliant with the
following theoretical observations. The Rayleigh Criterion gives a linear correlation between the telescope
diameter and the distance where images of a constant
quality can be taken. Furthermore, the brightness of
the image decreases quadratically when the distance increases, and the area of the mirror, i.e., its capability
to gather light, increases quadratically with increasing
mirror diameter. Thus overall, the relation between
distance and mirror diameter is also linear.
1.22
u1
nd
1.22nd
=
u1
for
u1 = cos()
2
1
r a0
a0
x
.
Figure 13. Reflections at the inner side and at the outer side of a spoon, taken from a distance of 5m.
The 18pt font is readable from the reflection in the right figure, and almost readable in the left figure.
Figure 14. Reflections of a printed paper in a tea pot, taken from a distance of 5m. The paper was
located close to the tea pot, yielding excellent reflections.
Figure 15. Reflections of the monitor in a tea pot, taken from a distance of 40 meters. Readability is
good enough to identify relevant information from, say, business charts.
Figure 16. Reflections in a tea pot, taken from a large distance of 30 meters using a larger telescope.
The 18pt font is readable from the reflections.
6.3. Disguise
Standing with a large telescope directly in front of
the user and observing him obviously causes suspicion.
It is essential for the attacker to be unnoticed. Assuming a distance of 10 meters or more, the telescope could
be mounted inside a small van parked near the window
of the user (assuming a ground oor oce). Opacifying the windows of the van except for one window and
switching o lights inside, the telescope should not be
6. Threat Analysis
6.1. Possibility of Improvement
The experimental results presented in this paper are
only a rst case study. The most obvious improvement
10
$6
$18
$16
Zambuto Carl
(APM)
$14
$12
Swayze
Optical
$10
$8
$6
Discovery
Telescopes
$4
$5
$4
$3
$2
$1
$2
$0
64
56
46
37
15
64
56
61
46
51
37
41
25
32
15
20
$0
25
Thousands
$20
Figure 17. Prices of Newtonian mirrors of various manufacturers for increasing diameter (left side),
and per square-cm (right side).
We are currently conducting experiments on a related attack that is not based on reecting objects, but
rather exploits diuse reections on the users clothes
or on a nearby wall. The approach is grounded on the
following idea: A single monitor pixel (in particular for
LCD displays) produces a slightly directed beam; hence
a narrow area of the wall is lightened, which is called
the Point spread function (PSF). Measuring this function and applying modern deconvolution algorithms
both to this function and the image of the light distribution on the wall allow for partial re-computation
of the monitor image. Algorithms already exist that
behave well if the original image has high contrasts,
e.g., text documents on a monitor. While diuse reections naturally complicate the situation, rst examples
indicate that this approach is feasible at least under
idealized conditions: A diusely reected image of the
letter C and the corresponding reconstruction is shown
in Figure 18.
[11] P. Smulders. The threat of information theft by reception of electromagnetic radiation from RS-232 cables.
Computers & Security, 9:5358, 1990.
[12] W. van Eck. Electromagnetic radiation from video
display units: An eavesdropping risk? Computers &
Security, 4:269286, 1985.
[13] L. Zhuang, F. Zhou, and J.D.Tygar. Keyboard acoustic emanations revisited. In Proceedings of the 12th
ACM Conference on Computer and Communications
Security, 2005.
Acknowledgments
We would like to thank Hendrik Lensch and Andrei Lintu for helpful discussions and for giving us access to parts of their telescope equipment, to Markus
Ludes from APM Telescopes for giving us access to
the 60cm Dobson telescope, and to Markus Kuhn and
Jean-Jacques Quisquater for general comments.
References
[1] R. J. Anderson and M. G. Kuhn. Soft tempest an opportunity for NATO. In Information Systems Technology (IST) Symposium Protecting NATO Information
Systems in the 21st Century, 1999.
[2] D. Asonov and R. Agrawal. Keyboard acoustic emanations. In Proceedings of the 2004 IEEE Symposium
on Security and Privacy, 2004.
[3] R. Briol. Emanation: How to keep your data confidential. In Symposium on Electromagnetic Security for
Information Protection, 1991.
[4] H. J. Highland. Electromagnetic radiation revisited.
Comput. Secur., 5(2):8593, 1986.
[5] M. G. Kuhn. Optical time-domain eavesdropping risks
of CRT displays. In Proc. of the 2002 IEEE Symposium on Security and Privacy, 2002.
[6] M. G. Kuhn. Electromagnetic eavesdropping risks of
flat-panel displays. In Proc. 4th Workshop on Privacy
Enhancing Technologies, pages 88107, 2005.
[7] M. G. Kuhn. Security limits for compromising emanations. In Proc. of CHES 2005, volume 3659 of LNCS.
Springer, 2005.
[8] J. Loughry and D. A. Umphress. Information leakage
from optical emanation. ACM Transactions on Information and Systems Security, 5(3):262289, 2002.
[9] K. Nishino and S. K. Nayar. Corneal imaging system: Environment from eyes. International Journal
on Computer Vision, 2006.
[10] A. Shamir and E. Tromer. Acoustic cryptanalysis
on nosy people and noisy machines. Online at
http://people.csail.mit.edu/tromer/acoustic/.
12