LCD风暴气隙攻击重新加载

Mordechai Guri, Matan Monitz
{"title":"LCD风暴气隙攻击重新加载","authors":"Mordechai Guri, Matan Monitz","doi":"10.1109/ICSEE.2018.8646277","DOIUrl":null,"url":null,"abstract":"In 1998, researcher showed how attackers can transmit data from computers through electromagnetic radio waves generated by the computer video card. 20 years later, we examine this type of threat in a context of modern cyber-attacks. In this type of threat, attackers can covertly leak sensitive data from isolated (‘air-gapped’) computers using the electromagnetic emission from the video card. We present related work and give a brief technical background. We tested the TEMPEST attack with modern LCD screens and affordable user-defined-radio hardware available today for only $30. We implement a transmitter malware that can modulate binary data and transmit it over electromagnetic waves emitted from the video cable. We also implement a remote receiver, which demodulate and decode the transmission using GNU Radio. We present an analysis of the frequency range, effective distance and the bandwidth of this covert-channel. We found that malware can covertly leak data (e.g., encryption keys, keylogging data and documents) from air-gapped computers to a nearby RF receiver via the electromagnetic emission. The effective bitrate of this channel is 60 bit/sec to 640 bit/sec.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"LCD TEMPEST Air-Gap Attack Reloaded\",\"authors\":\"Mordechai Guri, Matan Monitz\",\"doi\":\"10.1109/ICSEE.2018.8646277\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In 1998, researcher showed how attackers can transmit data from computers through electromagnetic radio waves generated by the computer video card. 20 years later, we examine this type of threat in a context of modern cyber-attacks. In this type of threat, attackers can covertly leak sensitive data from isolated (‘air-gapped’) computers using the electromagnetic emission from the video card. We present related work and give a brief technical background. We tested the TEMPEST attack with modern LCD screens and affordable user-defined-radio hardware available today for only $30. We implement a transmitter malware that can modulate binary data and transmit it over electromagnetic waves emitted from the video cable. We also implement a remote receiver, which demodulate and decode the transmission using GNU Radio. We present an analysis of the frequency range, effective distance and the bandwidth of this covert-channel. We found that malware can covertly leak data (e.g., encryption keys, keylogging data and documents) from air-gapped computers to a nearby RF receiver via the electromagnetic emission. The effective bitrate of this channel is 60 bit/sec to 640 bit/sec.\",\"PeriodicalId\":254455,\"journal\":{\"name\":\"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSEE.2018.8646277\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSEE.2018.8646277","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

1998年,研究人员展示了攻击者如何通过计算机显卡产生的电磁无线电波从计算机传输数据。20年后,我们在现代网络攻击的背景下审视这类威胁。在这种类型的威胁中,攻击者可以利用视频卡的电磁辐射,从隔离的(“气隙”)计算机中秘密泄露敏感数据。我们介绍了相关工作,并简要介绍了技术背景。我们用现代LCD屏幕和价格合理的用户自定义无线电硬件测试了TEMPEST攻击,目前价格仅为30美元。我们实现了一个发射器恶意软件,它可以调制二进制数据并通过视频电缆发射的电磁波传输它。我们还实现了一个远程接收器,它使用GNU Radio对传输进行解调和解码。对该转换信道的频率范围、有效距离和带宽进行了分析。我们发现恶意软件可以通过电磁发射将数据(例如,加密密钥,键盘记录数据和文件)从气隙计算机秘密泄露到附近的射频接收器。该信道的有效比特率为60 ~ 640比特/秒。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
LCD TEMPEST Air-Gap Attack Reloaded
In 1998, researcher showed how attackers can transmit data from computers through electromagnetic radio waves generated by the computer video card. 20 years later, we examine this type of threat in a context of modern cyber-attacks. In this type of threat, attackers can covertly leak sensitive data from isolated (‘air-gapped’) computers using the electromagnetic emission from the video card. We present related work and give a brief technical background. We tested the TEMPEST attack with modern LCD screens and affordable user-defined-radio hardware available today for only $30. We implement a transmitter malware that can modulate binary data and transmit it over electromagnetic waves emitted from the video cable. We also implement a remote receiver, which demodulate and decode the transmission using GNU Radio. We present an analysis of the frequency range, effective distance and the bandwidth of this covert-channel. We found that malware can covertly leak data (e.g., encryption keys, keylogging data and documents) from air-gapped computers to a nearby RF receiver via the electromagnetic emission. The effective bitrate of this channel is 60 bit/sec to 640 bit/sec.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Robust Motion Compensation for Forensic Analysis of Egocentric Video using Joint Stabilization and Tracking DC low current Hall effect measurements Examining Change Detection Methods For Hyperspectral Data Effect of Reverberation in Speech-based Emotion Recognition Traveling-Wave Ring Oscillator – Simulations and Prototype Measurements for a New Architecture for a Transmission Line Based Oscillator
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1