Is it possible for a hacker to use HMDI radiation to watch your screen?

I read an interesting article today on how a hacker can Eavesdrop on HDMI from its Unintended Electromagnetic Emanations by scientists Santiago Fernández, Emilio Martínez, Gabriel Varela, Pablo Musé, Federico Larroca from University of the Republic in Montevideo.

The article is all about analyzing the electromagnetic waves that unintentionally emanate from the cables and connectors, particularly HDMI and its possible to train a deep learning model to map the observed electromagnetic signal back to the displayed image.

As a layman I have never thought that a HDMI which is quite innocent in nature and the only use of it is to transfer the audio and video signals. Can this be also used by hackers by utilizing the electromagnetic waves which it emits.

The fancy word is “TEMPEST”. TEMPEST is a term used to describe the unintentional emanation of sensitive or confidential information from electrical equipment.

Now when we talk about such attacks it cannot be done just like that there are technicalities and equipment’s involved. The article has considered a threat model to work on like a laptop, SDR hardware (Software defined ratio), an antenna and a Low Noise Amplifier (LNA).

Two separate operational scenarios has been considered:

  1. ATTACKER REMAINS UNNOTICED:

Example: Firstly, one where the attacker remains unnoticed, e.g., if the spied system is close to a wall and the attacker operates from the other side. In this case, the setup may include somewhat large directive antennas, and an online operation is viable where, for instance, the attacker adjusts the antenna’s direction until a proper image is obtained and only saves the images that they are interested in.

2. ONLY THE ATTACKER’S HARDWARE GOES UNNOTICED

Example: For instance, a small omnidirectional antenna is left near the HDMI cable and connectors of the spied system, and the spying PC is not visible or does not draw attention. In this case, which requires physical proximity to the spied system, the
attacker’s PC may periodically (e.g., every second) record a signal, process it to obtain an image, and save it for offline visualization. If hard drive space is not an issue, the attacker may even record the raw samples of the SDR periodically and apply our method to
these recordings.

The scientists have generated a training set and done the required testing but its important to remember that obtaining real captures is not a simple task. They mentioned that they used a monitor with a resolution of 1600 × 900 @ 60 fps, tuning the SDR to the third harmonic of the pixel frequency (324 MHz) using a modified version of the flowgraph of gr-tempest.

For detailed information, encourage to read the below article:

[2407.09717] Deep-TEMPEST: Using Deep Learning to Eavesdrop on HDMI from its Unintended Electromagnetic Emanations (arxiv.org)

Now, let’s talk about the countermeasures suggested by scientists:

When I read the countermeasures, I am unsure if this is something which a normal computer user can implement, or it must be implemented by the manufacturers, only time unfolds on how and who will implement them. I will save this for another Blog.

Countermeasures:

Two countermeasures were suggested, by modifying the displayed image (in a primarily eye-imperceptible manner to the computer user), inference based on the resulting emanations fails.

  1. One way to accomplish this is by adding low-level noise to the image displayed on the monitor, creating an adversarial attack on the neural network.
  2. Second way more perceptible but definitive solution is to use a color gradient on the images background, as illustrated in the article

The threat landscape is ever changing and never ending, so keep up with the technology and its changes. It is no more concern only to the cybersecurity world, now security has to be ingrained into everyone who use the digital technology.