【24h】

LCD TEMPEST Air-Gap Attack Reloaded

机译:LCD TEMPEST气隙攻击已重新加载

获取原文

摘要

In 1998, researcher showed how attackers can transmit data from computers through electromagnetic radio waves generated by the computer video card. 20 years later, we examine this type of threat in a context of modern cyber-attacks. In this type of threat, attackers can covertly leak sensitive data from isolated (`air-gapped') computers using the electromagnetic emission from the video card. We present related work and give a brief technical background. We tested the TEMPEST attack with modern LCD screens and affordable user-defined-radio hardware available today for only $30. We implement a transmitter malware that can modulate binary data and transmit it over electromagnetic waves emitted from the video cable. We also implement a remote receiver, which demodulate and decode the transmission using GNU Radio. We present an analysis of the frequency range, effective distance and the bandwidth of this covert-channel. We found that malware can covertly leak data (e.g., encryption keys, keylogging data and documents) from air-gapped computers to a nearby RF receiver via the electromagnetic emission. The effective bitrate of this channel is 60 bit/sec to 640 bit/sec.
机译:1998年,研究人员展示了攻击者如何通过计算机视频卡产生的电磁无线电波从计算机传输数据。 20年后,我们在现代网络攻击的背景下研究了这种类型的威胁。在这种类型的威胁中,攻击者可以利用视频卡的电磁辐射秘密地从隔离的(“气隙式”)计算机中泄漏敏感数据。我们介绍相关工作并提供简要的技术背景。我们使用现代LCD屏幕和价格合理的用户定义的无线电硬件测试了TEMPEST攻击,目前仅售30美元。我们实施了一种发射机恶意软件,该恶意软件可以调制二进制数据并通过视频电缆发出的电磁波进行传输。我们还实现了一个远程接收器,该接收器使用GNU Radio对传输进行解调和解码。我们对这个隐蔽通道的频率范围,有效距离和带宽进行了分析。我们发现恶意软件可以通过电磁辐射秘密地将数据从封闭的计算机泄漏到附近的RF接收器中(例如,加密密钥,密钥记录数据和文档)。该通道的有效比特率是60位/秒至640位/秒。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号