论文标题

空气维修器:通过遮盖表面振动从空调计算机中渗透数据

AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs

论文作者

Guri, Mordechai

论文摘要

气隙秘密通道是秘密通信渠道的特殊类型,使攻击者能够从隔离的无网络计算机中渗透数据。多年来,已经证明了各种类型的气隙秘密通道,包括电磁,磁性,声学,光学和热量。 在本文中,我们引入了一种新型的振动(地震)秘密通道。我们观察到,计算机以与内部风扇的旋转速度相关的频率振动。这些听不清的振动会影响放置计算机的整个结构。我们的方法基于恶意软件通过调节其内部风扇速度来控制计算机生成的振动的能力。我们表明,附近的智能手机可以通过集成的,敏感的\ textit {Accelerememper}来感知恶意软件生成的掩盖振动。值得注意的是,任何应用程序都可以访问智能手机中的加速度计传感器,而无需用户权限,这使此攻击高度回避。我们实施了空中维修器,编码二进制信息的恶意软件,并通过低频振动载体调节它。然后,通过在位于同一表面上的智能手机(例如,在桌子上)的智能手机上的恶意应用程序来解码数据。我们讨论攻击模型,提供技术背景,并提供实施细节和评估结果。我们的结果表明,使用空气维修器,可以通过振动将数据从空调计算机到附近的智能手机,甚至相邻桌子上的附近智能手机删除。最后,我们为这种新型攻击提供了一组对策。

Air-gap covert channels are special types of covert communication channels that enable attackers to exfiltrate data from isolated, network-less computers. Various types of air-gap covert channels have been demonstrated over the years, including electromagnetic, magnetic, acoustic, optical, and thermal. In this paper, we introduce a new type of vibrational (seismic) covert channel. We observe that computers vibrate at a frequency correlated to the rotation speed of their internal fans. These inaudible vibrations affect the entire structure on which the computer is placed. Our method is based on malware's capability of controlling the vibrations generated by a computer, by regulating its internal fan speeds. We show that the malware-generated covert vibrations can be sensed by nearby smartphones via the integrated, sensitive \textit{accelerometers}. Notably, the accelerometer sensors in smartphones can be accessed by any app without requiring the user permissions, which make this attack highly evasive. We implemented AiR-ViBeR, malware that encodes binary information, and modulate it over a low frequency vibrational carrier. The data is then decoded by malicious application on a smartphone placed on the same surface (e.g., on a desk). We discuss the attack model, provide technical background, and present the implementation details and evaluation results. Our results show that using AiR-ViBeR, data can be exfiltrated from air-gapped computer to a nearby smartphone on the same table, or even an adjacent table, via vibrations. Finally, we propose a set of countermeasures for this new type of attack.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源