Affiliation:
1. Ben-Gurion University of the Negev, Beer-Sheva, Israel
Abstract
Information is the most critical asset of modern organizations, and accordingly it is one of the resources most coveted by adversaries. When highly sensitive data is involved, an organization may resort to air gap isolation in which there is no networking connection between the inner network and the external world. While infiltrating an air-gapped network has been proven feasible in recent years, data exfiltration from an air-gapped network is still considered one of the most challenging phases of an advanced cyber-attack. In this article, we present “AirHopper,” a bifurcated malware that bridges the air gap between an isolated network and nearby infected mobile phones using FM signals. While it is known that software can intentionally create radio emissions from a video card, this is the first time that mobile phones serve as the intended receivers of the maliciously crafted electromagnetic signals. We examine the attack model and its limitations and discuss implementation considerations such as modulation methods, signal collision, and signal reconstruction. We test AirHopper in an existing workplace at a typical office building and demonstrate how valuable data such as keylogging and files can be exfiltrated from physically isolated computers to mobile phones at a distance of 1--7 meters, with an effective bandwidth of 13--60 bytes per second.
Publisher
Association for Computing Machinery (ACM)
Subject
Artificial Intelligence,Theoretical Computer Science
Reference62 articles.
1. P. Bellard. 2005. Analog and Digital TV (DVB-T) Signal Generation. Retrieved 10 8 2013 from http://bellard.org/dvbt/. P. Bellard. 2005. Analog and Digital TV (DVB-T) Signal Generation. Retrieved 10 8 2013 from http://bellard.org/dvbt/.
2. Broadcom. (n.d.). BCM4334. Retrieved October 8 2013 from http://www.broadcom.com/products/Wireless-LAN/802.11-Wireless-LAN-Solutions/BCM4334. Broadcom. (n.d.). BCM4334. Retrieved October 8 2013 from http://www.broadcom.com/products/Wireless-LAN/802.11-Wireless-LAN-Solutions/BCM4334.
3. A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events
4. A. Q. Z. Clark. 2013. An impact-aware defense against stuxnet. American Control. 10.1109/ACC.2013.6580475 A. Q. Z. Clark. 2013. An impact-aware defense against stuxnet. American Control. 10.1109/ACC.2013.6580475
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献