Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Tempest (codename)
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==References== {{reflist}} ===Sources=== {{refbegin|30em|indent=yes}} *{{cite book|last=Ciampa|first=Mark |title=CompTIA Security+ Guide to Network Security Fundamentals|url=https://books.google.com/books?id=Ksw2DwAAQBAJ&pg=PA378|year=2017|publisher=Cengage Learning|isbn=978-1-337-51477-4}} *{{cite conference |last1=Guri |first1=Mordechai |last2=Kedma |first2=Gabi |last3=Kachlon |first3=Assaf |last4=Elovici |first4=Yuval |title=AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies |book-title=Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software (MALCON 2014) |date=2014 |pages=58β67 |doi=10.1109/MALWARE.2014.6999418 |eprint=1411.0237}} *{{cite conference |last1=Guri |first1=Mordechai |last2=Monitz |first2=Matan |last3=Mirski |first3=Yisroel |last4=Elovici |first4=Yuval |title=BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations |book-title=Proceedings 2015 IEEE 28th Computer Security Foundations Symposium CSF 2015 |date=2015 |pages=276β289 |doi=10.1109/CSF.2015.26 |eprint=1503.07919}} *{{cite journal|last1=Guri|first1=Mordechai|last2=Zadov|first2=Boris|last3=Elovici|first3=Yuval|title=ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields|journal=IEEE Transactions on Information Forensics and Security|volume=15|year=2018|pages=1190β1203|issn=1556-6013|doi =10.1109/TIFS.2019.2938404|arxiv =1802.02700|bibcode=2018arXiv180202700G|s2cid=3622353}} *{{cite journal |title=GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies |first1=Mordechai|last1=Guri |first2=Assaf|last2=Kachlon |first3=Ofer|last3=Hasson |first4=Gabi|last4=Kedma |first5=Yisroel|last5=Mirsky |first6=Yuval|last6=Elovici |date=August 2015 |journal=24th USENIX Security Symposium (USENIX Security 15) |pages=849β864|isbn=9781939133113|url=http://blogs.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/guri|id={{YouTube|id=RChj7Mg3rC4}} }} * {{cite journal|last1=Kubiak|first1=Ireneusz|title=TEMPEST font counteracting a noninvasive acquisition of text data|journal=Turkish Journal of Electrical Engineering & Computer Sciences|volume=26|year=2018|pages=582β592|issn=1300-0632|doi=10.3906/elk-1704-263|doi-access=free}} *{{cite journal|last1=Kubiak|first1=Ireneusz|title=Font DesignβShape Processing of Text Information Structures in the Process of Non-Invasive Data Acquisition|journal=Computers|volume=8|issue=4|year=2019|pages=70|issn=2073-431X|doi=10.3390/computers8040070|doi-access=free}} * {{citation |doi= 10.1145/2046707.2046771 |chapter= (sp)i ''Phone'' |title= Proceedings of the 18th ACM conference on Computer and communications security - CCS '11 |year= 2011 |last1= Marquardt |first1= P. |last2= Verma |first2= A. |last3= Carter |first3= H. |last4= Traynor |first4= P. |isbn= 9781450309486 |pages= 551β561|s2cid= 5098788 }} *{{cite book|last=Stross|first=Charles |title=The Atrocity Archives: Book 1 in The Laundry Files|url=https://books.google.com/books?id=kvkzzmUcHKsC&pg=PT98|year=2010|publisher=Little, Brown |isbn=978-0-7481-2413-8}} *{{cite journal|last1=Boitan|first1=Alexandru|last2=Halunga|first2=Simona|last3=Bindar|first3=Valerica| last4=Fratu|first4=Octavian| title= Compromising electromagnetic emanations of usb mass storage devices|journal=Wireless Personal Communications|year=2020|pages=1β26}} {{refend}} {{Intelligence cycle management}} {{DEFAULTSORT:Tempest}} [[Category:Code names]] [[Category:Cryptographic attacks]] [[Category:Side-channel attacks]] [[Category:Signals intelligence]] [[Category:Surveillance]] [[Category:United States government secrecy]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)