Affiliation:
1. College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
2. Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China
Abstract
Power lines are commonly utilized for energy transmission, and they serve as a conduit for data exfiltration or infiltration in some specific scenarios. This paper explores the feasibility of establishing bidirectional communication between a modified plug and the equipment power line within an air-gapped network organization and with external entities. Bidirectional air-gap communication includes two scenarios, the data leak from air-gapped networks and the transmission of external data to air-gapped networks, namely, exfiltration and infiltration. In the exfiltration scenario, software in the air-gapped networks modulates and encodes data by manipulating the power consumption of the equipment during transmission, which is then sent outside through the power line. The device utilizes a smart plug power meter to record current fluctuations and subsequently decode any leaked data. In the infiltration scenario, a smart plug is used to control the power supply status of a device’s power cord, enabling data encoding and decoding by turning the power supply on and off. The software in the air-gapped equipment captures and decodes the power supply status to infiltrate. We discuss relevant literature and provide scientific background on smart plugs and power line communication. We simulate the communication scenario, propose a communication scheme, and present data modulation techniques as well as a communication transmission protocol for air-gap channels. Our evaluation of the PowerBridge air-gap channels demonstrates that data can leak from the air-gapped computer into the power line at an approximate rate of 30 bps, which can be captured by the smart plug. Additionally, it is possible for data to penetrate from the smart plug into air-gapped networks at a speed exceeding 1 bps.
Reference50 articles.
1. Nagendran, K., Balaji, S., Raj, B.A., Chanthrika, P., and Amirthaa, R.G. (2020, January 6–7). Web Application Firewall Evasion Techniques. Proceedings of the 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India.
2. Michener, D.R.J. (2024, June 25). Beating the Air-Gap: How Attackers Can Gain Access to Supposedly Isolated Systems. Available online: https://energycentral.com/c/iu/beating-air-gap-how-attackers-can-gain-access-supposedly-isolated-systems.
3. Elsadig, M.A., and Fadlalla, Y.A. (2017, January 8–11). Network Protocol Covert Channels: Countermeasures Techniques. Proceedings of the 2017 9th IEEE-GCC Conference and Exhibition (GCCCE), Manama, Bahrain.
4. Shen, C., Liu, T., Huang, J., and Tan, R. (2021, January 24–27). When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient. Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.
5. ThermalBleed: A Practical Thermal Side-Channel Attack;Kim;IEEE Access,2022