Electronic Security and Espionage (Extract)

Page 32

A Handbook on DIY Electronic Security and Espionage

depletion-mode 65 dictaphone 127 dictatorship 15, 21 dictionary attack 92 differential amplifier 87 dirty marketing 100 Doomsday Preppers 24 DoS attack 98 dot-matrix printer 52, 99, 150 Douglas Adams 95 DRAM 55, 68, 69, 74, 76 drilling attack 144, 145 DS1307 137, 162 dumb terminal 133, 200 dumpster-diving 11, 62, 66, 91 DUT 172 duty cycle 190 dynamite 97, 98

E eavesdropping 24, 25, 42, 78, 95, 105, 158, 191 EEPROM 28, 40, 41, 55, 57, 59, 64, 65, 71, 74, 108, 137, 148, 170, 196 electro-migration 66, 68 electronic warfare 42 El-Gamal 12, 101 encryption 11, 12, 13, 15, 16, 19, 20, 31, 32, 34, 36, 54, 61, 81, 82, 88, 90, 91, 92, 93, 94, 95, 96, 98, 99, 100, 101, 102, 103, 104, 105, 106, 116, 117, 118, 119, 123, 124, 145, 146, 182, 183, 187, 191, 199, 205, 207 enhancement-mode 64 ENIGMA 90, 91, 101, 145 e-paper 53 espionage 11, 14, 15, 16, 24, 215 Eurochip 107, 108, 109, 111, 145 exclusive or 34

F fall time 69, 74 FAT32 87, 124 fault injection 32 FCC 52 FERAM 59 ferroelectric 59 Filmnet 100 fingerprint 19, 27 FLASH 27, 28 flicker 41, 95

● 222


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.