论文标题

您的噪音,我的信号:从台式计算机中利用开关噪声来删除渗透

Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop Computers

论文作者

Shao, Zhihui, Islam, Mohammad A., Ren, Shaolei

论文摘要

基于功率分析的攻击一直存在并研究了,最近的一些作品着重于受害者系统的数据渗透,而无需使用常规通信(例如Wifi)。尽管如此,先前的工作通常依赖于侵入性直接功率测量,要么是通过将电表植入电源插座或利用电源线,从而损害了攻击的隐秘性。在本文中,我们提出了节点(数据剥落的噪声),这是一种从企业台式计算机中隐身数据剥落的新系统。具体而言,节点通过利用高频电压纹波(即,由功率因子校正电路在当今计算机中内置的电路产生的高频电压纹波(即,切换噪声))通过建筑物的功率网络实现数据渗透。接收器位于距离,甚至在其他房间的距离上,可以非侵入性地测量电源插座的电压,以捕获没有监督培训/学习的高频切换噪声,以用于在线信息解码。为了评估节点,我们在来自顶级供应商的七台不同计算机上运行实验,并使用顶级品牌电源单元。我们的结果表明,对于单个发射器,节点的速度高达28.48位/秒,距离为90英尺(27.4米),没有视线,表明实际上是隐秘的威胁。基于不同计算机开关噪声频率的正交性,我们还仅使用一个接收器从四个计算机中同时删除数据。最后,我们提出一些可能的防御措施,例如安装噪声过滤器,并讨论其局限性。

Attacks based on power analysis have been long existing and studied, with some recent works focused on data exfiltration from victim systems without using conventional communications (e.g., WiFi). Nonetheless, prior works typically rely on intrusive direct power measurement, either by implanting meters in the power outlet or tapping into the power cable, thus jeopardizing the stealthiness of attacks. In this paper, we propose NoDE (Noise for Data Exfiltration), a new system for stealthy data exfiltration from enterprise desktop computers. Specifically, NoDE achieves data exfiltration over a building's power network by exploiting high-frequency voltage ripples (i.e., switching noises) generated by power factor correction circuits built into today's computers. Located at a distance and even from a different room, the receiver can non-intrusively measure the voltage of a power outlet to capture the high-frequency switching noises for online information decoding without supervised training/learning. To evaluate NoDE, we run experiments on seven different computers from top-vendors and using top brand power supply units. Our results show that for a single transmitter, NoDE achieves a rate of up to 28.48 bits/second with a distance of 90 feet (27.4 meters) without the line of sight, demonstrating a practically stealthy threat. Based on the orthogonality of switching noise frequencies of different computers, we also demonstrate simultaneous data exfiltration from four computers using only one receiver. Finally, we present a few possible defenses, such as installing noise filters, and discuss their limitations.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源