Camouflaged with Size: A Case Study of Espionage using Acquirable Single-Board Computers

09/11/2018
by   Kiavash Satvat, et al.
0

Single-Board Computers (SBC) refer to pocket-sized computers built on a single circuit board. A number of studies have explored the use of these highly popular devices in a variety of domains, including military, agriculture, healthcare, and more. However, no attempt was made to signify possible security risks that misuse of these devices may bring to organizations. In this study, we perform a series of experiments to validate the possibility of using SBCs as an espionage gadget. We show how an attacker can turn a Raspberry Pi device to an attacking gadget and benefit from short-term physical access to attach the gadget to the network in order to access unauthorized data or perform other malicious activities. We then provide experimental results of placing such tools in two real-world networks. Given the small size of SBCs, traditional physical security measures deployed in organizations may not be sufficient to detect and restrict the entrance of SBCs to their premises. Therefore, we reiterate possible directions for network administrators to deploy defensive mechanisms for detecting and preventing such attacks.

READ FULL TEXT

page 4

page 6

page 7

page 8

page 9

research
07/19/2021

Increasing FPS for single board computers and embedded computers in 2021 (Jetson nano and YOVOv4-tiny). Practice and review

This manuscript provides a review of methods for increasing the frame pe...
research
04/18/2022

LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers

In today's computing environment, where Artificial Intelligence (AI) and...
research
01/20/2021

Fooling thermal infrared pedestrian detectors in real world using small bulbs

Thermal infrared detection systems play an important role in many areas ...
research
12/21/2017

Acoustic Denial of Service Attacks on HDDs

Among storage components, hard disk drives (HDDs) have become the most c...
research
01/23/2018

qrypt0 - encrypted short messages exchanged between offline computers

A system is described for exchanging encrypted short messages between co...
research
06/05/2014

Systematic N-tuple Networks for Position Evaluation: Exceeding 90 the Othello League

N-tuple networks have been successfully used as position evaluation func...

Please sign up or login with your details

Forgot password? Click here to reset