Cool, cool... Can we like, not do this kinda stuff? Appreciate it.
Hardware
All things related to technology hardware, with a focus on computing hardware.
Rules (Click to Expand):
-
Follow the Lemmy.world Rules - https://mastodon.world/about
-
Be kind. No bullying, harassment, racism, sexism etc. against other users.
-
No Spam, illegal content, or NSFW content.
-
Please stay on topic, adjacent topics (e.g. software) are fine if they are strongly relevant to technology hardware. Another example would be business news for hardware-focused companies.
-
Please try and post original sources when possible (as opposed to summaries).
-
If posting an archived version of the article, please include a URL link to the original article in the body of the post.
Some other hardware communities across Lemmy:
- Augmented Reality - !augmented_reality@lemmy.world
- Gaming Laptops - !gaminglaptops@lemmy.world
- Laptops - !laptops@lemmy.world
- Linux Hardware - !linuxhardware@programming.dev
- Mechanical Keyboards - !mechanicalkeyboards@kbin.social
- Microcontrollers - !microcontrollers@lemux.minnix.dev
- Monitors - !monitors@lemm.ee
- Raspberry Pi - !raspberry_pi@programming.dev
- Retro Computing - !retrocomputing@lemmy.sdf.org
- Single Board Computers - !sbcs@lemux.minnix.dev
- Virtual Reality - !virtualreality@lemmy.world
Icon by "icon lauk" under CC BY 3.0
Technology terrifies me
I don't really love this preprint from at least an academic perspective. They don't really talk at all about the specs of the monitor, cable, or target machine. When you're talking about emi interception then discussion of the test conditions is kinda important in a paper. What's the base emi leakage for the system? What's the range in commonly available cables. Is this affected by shielding?
Also I really don't see why they're using a hough line transform to detect the blanking interval. Those two things are not really related (in that probabilistically or exhaustively fitting lines to an image does not easily result in an estimate of blanking interval, and is horribly inefficient in realtime applications too.)
Basically in my opinion this is a cool idea with a pretty mediocre preprint attached, and one where a bunch of the sources are other preprints too. Not damnable but I'd expect more.
If you wanna see a much better paper containing more of what I'd expect from a physical attack vector paper, I'd look at the original Rowhammer paper from 2014
(also the use of the term AI in the actual article is irritating. It's a basic CNN, it's not incredibly complex stuff. Just call it ML guys...)
Agreed, it's a pretty high level overview.
(also the use of the term AI in the actual article is irritating. It’s a basic CNN, it’s not incredibly complex stuff. Just call it ML guys…)
I think this particular battle has been lost a long time ago.
That's ok, at least ML makes you sound like someone who knows that they're talking about and hasn't fallen for marketing BS
AI can also taste your fear.. and finds it delicious.
Finally, password inputs that don't show the actual characters are useful 😹
As if emi from unencrypted USB keyboards (aka all USB keyboards) would be more difficult for password stealing.
Hmmm… I wonder if DVI or USB-C also has this weakness? I would imagine that USB-C would have power or other accessories flowing through it, like a laptop hooked up to monitors with a keyboard/mouse setup, that would make this harder.
Good question, I imagine with enough training data, you could also apply this method to DVI or USB-C, I don't see why this wouldn't be the case.
But I am looking at this as an observer as opposed to someone working in the industry.
Everything needs to be shielded? Or quad shield