RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM
- URL: http://arxiv.org/abs/2409.02292v1
- Date: Tue, 3 Sep 2024 21:06:04 GMT
- Title: RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM
- Authors: Mordechai Guri,
- Abstract summary: We present an attack allowing adversaries to leak information from air-gapped computers.
We show that malware on a compromised computer can generate radio signals from memory buses (RAM)
With software-defined radio (SDR) hardware, and a simple off-the-shelf antenna, an attacker can intercept transmitted raw radio signals from a distance.
- Score: 1.74048653626208
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Air-gapped systems are physically separated from external networks, including the Internet. This isolation is achieved by keeping the air-gap computers disconnected from wired or wireless networks, preventing direct or remote communication with other devices or networks. Air-gap measures may be used in sensitive environments where security and isolation are critical to prevent private and confidential information leakage. In this paper, we present an attack allowing adversaries to leak information from air-gapped computers. We show that malware on a compromised computer can generate radio signals from memory buses (RAM). Using software-generated radio signals, malware can encode sensitive information such as files, images, keylogging, biometric information, and encryption keys. With software-defined radio (SDR) hardware, and a simple off-the-shelf antenna, an attacker can intercept transmitted raw radio signals from a distance. The signals can then be decoded and translated back into binary information. We discuss the design and implementation and present related work and evaluation results. This paper presents fast modification methods to leak data from air-gapped computers at 1000 bits per second. Finally, we propose countermeasures to mitigate this out-of-band air-gap threat.
Related papers
- PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via `Singing Pixels' [1.74048653626208]
PIXHELL is a new type of covert channel attack allowing hackers to leak information via noise generated by the pixels on the screen.
The malicious code exploits the sound generated by coils and capacitors to control the frequencies emanating from the screen.
Our test shows that with a PIXHELL attack, textual and binary data can be exfiltrated from air-gapped, audio-gapped computers at a distance of 2m via sound modulated from LCD screens.
arXiv Detail & Related papers (2024-09-07T23:09:56Z) - Mind The Gap: Can Air-Gaps Keep Your Private Data Secure? [1.74048653626208]
'Air-gap' measures keep sensitive data in networks entirely isolated from the Internet.
Air-gap networks are relevant today to governmental organizations, healthcare industries, finance sectors, intellectual property and legal firms.
Motivated and capable adversaries can use sophisticated attack vectors to penetrate the air-gapped networks, leaking sensitive data outward.
arXiv Detail & Related papers (2024-09-06T11:08:05Z) - Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation [19.88283575742985]
We consider a common RF fingerprinting scenario, where machine learning models are trained from pilot signal data for identification.
A novel adversarial attack solution is designed to generate proper perturbations, whereby the pilot signal can hide the hardware feature and misclassify the model.
Extensive experiment results demonstrate that the RF fingerprints can be effectively erased to protect the user privacy.
arXiv Detail & Related papers (2024-06-11T15:16:05Z) - Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks [55.340315838742015]
Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks.
In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis.
arXiv Detail & Related papers (2024-03-29T12:01:31Z) - Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces [20.406776153173176]
We propose a novel approach that allows for environment-adaptive spatial control of wireless jamming signals.
We demonstrate complete denial-of-service of a Wi-Fi device while a second device located at a distance as close as 5 mm remains unaffected.
arXiv Detail & Related papers (2024-02-21T12:50:44Z) - Fortress: Securing IoT Peripherals with Trusted Execution Environments [2.2476099815732518]
Internet of Things (IoT) devices often collect confidential information, such as audio and visual data, through peripheral inputs like microphones and cameras.
We propose a generic design to enhance the privacy in IoT-based systems by isolating peripheral I/O memory regions in a secure kernel space of a trusted execution environment (TEE)
The sensitive peripheral data is then securely transferred to a user-space TEE, where obfuscation mechanisms can be applied before it is relayed to third parties, e.g., the cloud.
arXiv Detail & Related papers (2023-12-05T07:12:58Z) - Deep Reinforcement Learning for Interference Management in UAV-based 3D
Networks: Potentials and Challenges [137.47736805685457]
We show that interference can still be effectively mitigated even without knowing its channel information.
By harnessing interference, the proposed solutions enable the continued growth of civilian UAVs.
arXiv Detail & Related papers (2023-05-11T18:06:46Z) - Is Semantic Communications Secure? A Tale of Multi-Domain Adversarial
Attacks [70.51799606279883]
We introduce test-time adversarial attacks on deep neural networks (DNNs) for semantic communications.
We show that it is possible to change the semantics of the transferred information even when the reconstruction loss remains low.
arXiv Detail & Related papers (2022-12-20T17:13:22Z) - Covert Communications via Adversarial Machine Learning and
Reconfigurable Intelligent Surfaces [46.34482158291128]
The reconfigurable intelligent surfaces (RISs) rely on arrays of unit cells to control the scattering and reflection profiles of signals.
In this paper, covert communication is considered in the presence of the RIS.
arXiv Detail & Related papers (2021-12-21T18:23:57Z) - Blind Federated Edge Learning [93.29571175702735]
We study federated edge learning (FEEL), where wireless edge devices, each with its own dataset, learn a global model.
We propose an analog over-the-air' aggregation scheme, in which the devices transmit their local updates in an uncoded fashion.
arXiv Detail & Related papers (2020-10-19T16:22:28Z) - Mind the GAP: Security & Privacy Risks of Contact Tracing Apps [75.7995398006171]
Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy.
We demonstrate that in real-world scenarios the GAP design is vulnerable to (i) profiling and possibly de-anonymizing persons, and (ii) relay-based wormhole attacks that basically can generate fake contacts.
arXiv Detail & Related papers (2020-06-10T16:05:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.