This article has been reviewed according to Science X's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:

fact-checked

preprint

trusted source

proofread

Security researchers reveal it is possible to eavesdrop on HDMI cables to capture computer screen data

Security researchers reveal it is possible to eavesdrop on HDMI cables to capture computer screen data
Proposed system. The HDMI cable and connectors emit unintended electromagnetic signals, which are captured by the SDR and processed by gr-tempest, obtaining a degraded complex-valued image, which in turn is fed to a convolutional neural network to infer the source image. All three images correspond to actual results. Credit: arXiv (2024). DOI: 10.48550/arxiv.2407.09717

A trio of computer security researchers at Universidad de la República Montevideo, in Uruguay, reports that it is possible to reproduce text on a computer screen by eavesdropping on its HDMI cable. Santiago Fernández Emilio Martínez, Gabriel Varela, and Pablo Musé Federico Larroca, have published a paper describing their discovery on the arXiv preprint server.

Back in the days of CRT-based computer screens, hackers learned early on that it was not difficult to translate the emissions into imagery that revealed the contents of someone else's computer screen. When the industry moved to LED-based screens, which use HDMI cables, hacking became much more difficult due to the vastly more complex signaling. In this new study, the team in Uruguay has found that applying AI to the problem makes it possible.

The work involved capturing electromagnetic radiation emitted from a computer's HDMI cables. They then trained an AI system by giving it screen samples associated with radiation signals moving through the computer's HDMI cable. Over time, the system gradually grew better at deciphering the text displayed on a given computer screen.

Testing showed the system capable of reconstructing text from a random computer screen with 70% accuracy. Good enough, the research team suggests, for most people to get the gist of text on a given . They also note it is likely good enough to steal passwords, , or in some cases, encrypted communications. The researchers found they could improve their results by using text recognition software on the text after it was deciphered.

Demo of deep-TEMPEST

The researchers suggest have likely already conducted similar research, meaning such screen-grabbing is probably already targeting hapless users. All it would take, they note, is hardware capable of capturing the electromagnetic radiation emitted by HDMI cables placed near a building, such as in the back seat of a car.

The team further suggests that most people are not at risk of such an attack, however, due to the skillset the technique requires. Instead, they suggest it is much more likely a government or corporate entity would be targeted.

More information: Santiago Fernández et al, Deep-TEMPEST: Using Deep Learning to Eavesdrop on HDMI from its Unintended Electromagnetic Emanations, arXiv (2024). DOI: 10.48550/arxiv.2407.09717

Code: github.com/emidan19/deep-tempest

Journal information: arXiv

© 2024 Science X Network

Citation: Security researchers reveal it is possible to eavesdrop on HDMI cables to capture computer screen data (2024, July 30) retrieved 30 July 2024 from https://techxplore.com/news/2024-07-reveal-eavesdrop-hdmi-cables-capture.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

Brain–computer interface experiments first to decode words 'spoken' entirely in the brain in real time

70 shares

Feedback to editors