Just In
- 16 hrs ago Best Noise-Cancelling Earbuds Under Rs 5,000: CMF Buds Pro, Redmi Buds 5, Realme Buds Air 5, and More
- 16 hrs ago How to Get Zomato Gold Membership Worth Rs 999 for Free
- 18 hrs ago Garena Free Fire Max Redeem Codes for April 20, 2024: Get Access to the Latest In-game Loot
- 18 hrs ago Apple Watch X Renders Surface: Magnetic Bands, Blood Pressure Tracking, and More
Don't Miss
- Sports KKR vs RCB IPL 2024: Eden Gardens Pitch Report, Kolkata Weather Forecast & Live Streaming Info
- Finance 1:6 Split Soon: Metal Giant Vedanta Announces Q4 Results Data; Key Factors To Watch, BUY OR SELL?
- News US House Passes $95 Billion Aid For Ukraine, Israel And Taiwan
- Lifestyle Ananya Panday Ups Her Summer Style Game For Femina Magazine Shoot, Get Inspired!
- Movies When Aishwarya Rai Gives ‘Classy Slap’ On Journalist’s Face For Asking Her To Pose Nude, Watch Video
- Education Assam Class 10 Result 2024 Declared: Anurag Emerged as the Top Performer With 593 Marks
- Automobiles Tata Altroz Records a 55% Sales Growth in March 2024
- Travel Journey From Delhi To Ooty: Top Transport Options And Attractions
A Technology to ward off Hackers when Internet is Disabled
Do you know that even if you had your internet connection disabled, you could still be emanating information that somebody could use to attack your computer or smartphone?
The hackers may be able to view what you are doing by just analysing the low-power electronic signals your laptop emits even when it is not connected to internet, researchers reported, adding that smartphones may be even more vulnerable to such spying.
By studying emissions from multiple computers, the team from the Georgia Institute of Technology in the US has developed a matrix for measuring the strength of the leaks - known technically as "side-channel signal" - to help prioritise security efforts.
"Side-channel" emissions can be measured several feet away from an operating computer using a variety of spying methods.
Each computer operation has a different potential for leaking information.
The processor draws different amounts of current depending on the operation, creating fluctuations that can be measured.
Saving data to memory also requires a large amount of current, creating a "loud" operation.
Recommended: Top 8 Weird and Funny Gadgets Spotted at CES 2015
"When you are executing instructions in the processor, you generate a different type of waveform than if you are doing things in memory. And there is interaction between the two," said Alenka Zajic, assistant professor at Georgia Tech.
To measure the vulnerability, Zajic and the team developed a metric known as "signal available to attacker" (SAVAT), which is a measure of the strength of the signal emitted.
They measured the level of SAVAT for 11 different instructions executed on three different laptops and found the largest signals when the processors accessed off-chip memory.
It is not really possible to eliminate all "side-channel signal".
Recommended: Top 10 Upcoming Rumored Smartphones Expected To Launch in 2015
"The trick is to make those signals weak so potential attackers would have to use larger antennas and utilise time-consuming signal analyses," Zajic added.
The researchers are also now studying smartphones, whose compact design and large differential between idle and in-use power may make them more vulnerable.
The research was presented at the 47th annual IEEE/ACM international symposium on micro-architecture in Cambridge recently.
Source: IANS
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
18,800
-
62,425
-
1,15,909
-
93,635
-
75,804
-
9,999
-
11,999
-
3,999
-
2,500
-
3,599