PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

04/10/2018
by   Mordechai Guri, et al.
0

In this paper we provide an implementation, evaluation, and analysis of PowerHammer, a malware (bridgeware [1]) that uses power lines to exfiltrate data from air-gapped computers. In this case, a malicious code running on a compromised computer can control the power consumption of the system by intentionally regulating the CPU utilization. Data is modulated, encoded, and transmitted on top of the current flow fluctuations, and then it is conducted and propagated through the power lines. This phenomena is known as a 'conducted emission'. We present two versions of the attack. Line level powerhammering: In this attack, the attacker taps the in-home power lines1 that are directly attached to the electrical outlet. Phase level power-hammering: In this attack, the attacker taps the power lines at the phase level, in the main electrical service panel. In both versions of the attack, the attacker measures the emission conducted and then decodes the exfiltrated data. We describe the adversarial attack model and present modulations and encoding schemes along with a transmission protocol. We evaluate the covert channel in different scenarios and discuss signal-to-noise (SNR), signal processing, and forms of interference. We also present a set of defensive countermeasures. Our results show that binary data can be covertly exfiltrated from air-gapped computers through the power lines at bit rates of 1000 bit/sec for the line level power-hammering attack and 10 bit/sec for the phase level power-hammering attack.

READ FULL TEXT

page 2

page 7

page 8

page 11

page 12

research
12/07/2022

COVID-bit: Keep a Distance of (at least) 2m From My Air-Gap Computer!

Air-gapped systems are isolated from the Internet due to the sensitive i...
research
09/30/2021

LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables

Air-gapped networks are wired with Ethernet cables since wireless connec...
research
07/10/2019

CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs

Using the keyboard LEDs to send data optically was proposed in 2002 by L...
research
04/23/2018

BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets

Cryptocurrency wallets store the wallets private key(s), and hence, are ...
research
02/04/2020

BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness

Air-gapped computers are systems that are kept isolated from the Interne...
research
04/03/2018

Cognitive Radio from Hell: Flipping Attack on Direct-Sequence Spread Spectrum

In this paper, we introduce a strong adversarial attack, referred to as ...
research
02/07/2018

MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields

In this paper, we show that attackers can leak data from isolated, air-g...

Please sign up or login with your details

Forgot password? Click here to reset