科学美国人60秒:非联网状态下的电脑入侵 研究人员提醒进行防范
日期:2015-02-12 16:09

(单词翻译:单击)

[JRaMybr972_Pns4~p&oYL5&VJ~;5Ly

听力文本

Gyn-#yAVKU+Xqxmxc4Y~

Connecting your computer to the Internet gives would-be spies an obvious entry point to your machine.

xE#WD.IC)4aj)

But other ways exist to snoop.

^#,&zxW6,F])2n

Because even computers that aren't connected to the Internet broadcast their activity in the form of electromagnetic radiation.

#JKga;VYB#^u=*f.OB*

Basically your computer is full of transistors.

9BM0_Nl*L*oJ8R(

And they're switching current from high to low depending if it is a zero or a one of the bit that they're trying to execute."

Ym0jQBi5yzQ

Alenka Zajic, an electrical engineer at Georgia Tech.

2J1=tXF|II(

"When you do that you're creating a voltage fluctuation and current fluctuation.

FX=3[G|5~Unfi~cU

And that basically creates electromagnetic field."

k^-.w!jshAKhs3

By hooking an antenna and receiver up to a laptop, Zajic and her colleagues were able to log the keystrokes of a computer in the next room, by measuring exceedingly tiny fluctuations in the computer's radiation.

CF[LMh4!lfF53F

The same technique can reveal which programs you're using, too.

#PS&p.~2;D-RKq4

Every one of them has a different signature in electromagnetic fields.

a_9S!ZmV@,^_M3,PWm8

So I can tell which application you opened by looking into the spectrum.

CU,1G&=h*zh(C-y~B

The researchers quantified the signal available to eavesdroppers in a recent paper,presented at the IEEE/ACM International Symposium on Microarchitecture in the U.K.

@]trRL*t6gI

Of course, real spies at the NSA and the CIA probably already know about this trick, she says.

,q])]B6aoeLk,

But by alerting developers to the problem, it might be possible to mask these electromagnetic leaks.

=ozKZHv5Kt~Eap0seq%I

And keep your computer's activity to yourself.

D[BKZ0BkQ;D&B

中文翻译

r75g;j!lH4r

将你的电脑连接入网会给潜在间谍入侵提供可乘之机|!=iJ#KPmKG

NmK69]R[G!

但窥探你电脑的方式并非只此一种=e2#t.BUyK

H]LQucfAHm9)+^3-qE

因为即使是未联网状态的电脑也会通过电磁辐射这种形式使你的行踪变得一览无余SLb4KVF6,GE2+@*[fv

3m]n-oP&QqHe!Wi

电脑基本上是由晶体管所组成#.ww_+B^;~Dpw9!5WB,

y[9(2TC#qZlq)a5M

如果这些晶体管传导的电流是零或是一个比特单位,电流就会从高到低进行转换pW~=ENH7Fe

#LA.6T#)e^9

乔治州技术学院机电工程师阿勒卡·扎伊克说道,

)0NqY[AKS+y_


nqk[&^R9w~;,VR


;aO5i8f&VAuaMHEonr1y

“当你这样做的时候,实际上创造的是一种电压及电流的波动9^WA&7tcscOZ

r_JjD2XS5MHYKL,5QhP

而基础而言就是在创造电磁场!f7w_st.Q|0bN#x*U8。”

b#wPa&o6i0

将天线和接收器接入到一台笔记本电脑后,通过测量电脑辐射产生极微小的波动,扎伊克和同事们就能对隔壁房间的电脑按键记录了如指掌Ka^NeW@Mkba*sp

m|*0Zx##@14M4

同样的技术还可以告诉你使用过哪些电脑程序yLNR[t]DGD

RnPa^ETYWZ-yI)0hf

每个应用程序在电磁场中都有着截然不同的信号U9w-Qg)6HA3n7F

F5-WYcBu2X~c1uk;n

所以通过观察光谱,我们就能知道你使用过哪款应用程序*%E0S-nBGzOkdhA@P。”

Bv[w*fX3;dq+I%)^Y[

研究人员们在最近的一篇文章中将窃听者的可用信号进行量化,最终在英国微体系结构IEEE/ACM国际研讨会上进行发表o*6Rq6~YH[J

5am9o~yj4KRv[^ALUXu

当然,美国国家安全局和中央情报局的间谍可能早就对这些烂熟于心b0|*vh!lSmcw

E@A6ymMZw9re

但通过让开发人员们意识到这一问题,或许能够为这些电磁泄漏进行遮丑工作O(j+n_SZnca3N0.Eb

Y2#Vr~+yONqz_=gNRRYk

并且确保使用者计算机的安全ulF=6lR)N9T%+bo

cndkSH&d_C-|~)&5UYTb


Ez.oTHY.HQP]B1coR7

译文为可可英语翻译,未经授权请勿转载!

P=SopdD!)-uW%

词语解释

%O9Fl&4|+tyJix

1.point to 指向;点到

L;pRr01aFtRckC

High interest rates do not point to a buoyant market this year.

+ysP0W,M9uj+P0EjT

今年的高利率并不表明市场繁荣@CMMxgRKgbr#D;aH*

l6p-V0r@68F.t62d~ah

High electricity bills point to a poor heating system or bad insulation.

pB9eRtNe]Ri]Q)6IhCW

高额电费开支说明供暖系统不足或建筑隔热材料不良e5;+tBTQYL3h

a#7,&*TcSID|lPS#b3I

2.connect to 连接

+z.tRjKG[SW^|

wo cables connect to each corner of the plate.

dJ6Ua=NG9Uj04UMI&Y

两条电缆连到金属板的每个角上BkdZ^fB%;f

bH^#1NXq6xF]kjN

You can connect the machine to your hi-fi.

4kc,3Ce7Ues~^11^0

你可以把机器连在高保真音响上Gm7P6caZ)qVdarv[]ny8

IfNhHErKlJs^%ng5[zm0LK[J=dFzh)xh233Jg_k[rx,
分享到
重点单词
  • radiationn. 辐射,放射线
  • executevt. 执行,处决,实行,完成 [计算机] 执行
  • revealvt. 显示,透露 n. (外墙与门或窗之间的)窗侧,门
  • spectrumn. 光谱,范围,系列
  • signaln. 信号,标志 v. (发信号)通知、表示 adj.
  • fluctuationn. 波动,起伏
  • currentn. (水、气、电)流,趋势 adj. 流通的,现在的,
  • techniquen. 技术,技巧,技能
  • applicationn. 应用; 申请; 专心 n. 应用软件程序
  • entryn. 进入,入口,登记,条目