Skip navigation
Please use this identifier to cite or link to this item: http://arks.princeton.edu/ark:/88435/dsp01k643b3496
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorFelten, Edward-
dc.contributor.advisorVerma, Naveen-
dc.contributor.authorOwen, Gregory-
dc.date.accessioned2015-06-26T18:11:55Z-
dc.date.available2015-06-26T18:11:55Z-
dc.date.created2015-04-30-
dc.date.issued2015-06-26-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/dsp01k643b3496-
dc.description.abstractIn this thesis I present a side-channel attack against the Nexus 5, an Android smartphone, that exploits the electromagnetic radiation given off by the phone to identify which app is being run. The attack uses a consumer software-defined radio and homemade antennas tuned to 3.7 MHz and 12.4 MHz and can differentiate between a set of six different apps at a distance of up to 6 cm with an amplifier or 1 cm without. These apps were chosen so that their mere presence on a phone would give information about the political affiliations, religious beliefs, or sexual preferences of the phone’s owner. I also identify two potential sources of the compromising radiation using both the position within the phone that seems to be the source of the radiation and the characteristic radiation patterns of individual functions such as Wi-Fi use and computation. I conclude by noting that this attack is extremely cheap, portable, and easy to assemble, indicating that it a sign of things to come.en_US
dc.format.extent35 pagesen_US
dc.language.isoen_USen_US
dc.titleThe Coming TEMPESTen_US
dc.typePrinceton University Senior Theses-
pu.date.classyear2015en_US
pu.departmentComputer Scienceen_US
pu.pdf.coverpageSeniorThesisCoverPage-
Appears in Collections:Computer Science, 1988-2020

Files in This Item:
File SizeFormat 
PUTheses2015-Owen_Gregory.pdf17.05 MBAdobe PDF    Request a copy


Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.