BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness

02/04/2020
by   Mordechai Guri, et al.
0

Air-gapped computers are systems that are kept isolated from the Internet since they store or process sensitive information. In this paper, we introduce an optical covert channel in which an attacker can leak (or, exfiltlrate) sensitive information from air-gapped computers through manipulations on the screen brightness. This covert channel is invisible and it works even while the user is working on the computer. Malware on a compromised computer can obtain sensitive data (e.g., files, images, encryption keys and passwords), and modulate it within the screen brightness, invisible to users. The small changes in the brightness are invisible to humans but can be recovered from video streams taken by cameras such as a local security camera, smartphone camera or a webcam. We present related work and discuss the technical and scientific background of this covert channel. We examined the channel's boundaries under various parameters, with different types of computer and TV screens, and at several distances. We also tested different types of camera receivers to demonstrate the covert channel. Lastly, we present relevant countermeasures to this type of attack. Lastly, we present relevant countermeasures to this type of attack.

READ FULL TEXT

page 2

page 3

page 4

research
12/07/2022

COVID-bit: Keep a Distance of (at least) 2m From My Air-Gap Computer!

Air-gapped systems are isolated from the Internet due to the sensitive i...
research
07/10/2019

CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs

Using the keyboard LEDs to send data optically was proposed in 2002 by L...
research
04/13/2020

AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs

Air-gap covert channels are special types of covert communication channe...
research
04/23/2018

BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets

Cryptocurrency wallets store the wallets private key(s), and hence, are ...
research
02/07/2018

MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields

In this paper, we show that attackers can leak data from isolated, air-g...
research
04/10/2018

PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

In this paper we provide an implementation, evaluation, and analysis of ...
research
01/10/2018

IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals

he technology on infrared remote control is widely applied in human dail...

Please sign up or login with your details

Forgot password? Click here to reset