Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/CSF.2015.26guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations

Published: 13 July 2015 Publication History

Abstract

It has been assumed that the physical separation ('air-gap') of computers provides a reliable level of security, such that should two adjacent computers become compromised, the covert exchange of data between them would be impossible. In this paper, we demonstrate BitWhisper, a method of bridging the air-gap between adjacent compromised computers by using their heat emissions and built-in thermal sensors to create a covert communication channel. Our method is unique in two respects: it supports bidirectional communication, and it requires no additional dedicated peripheral hardware. We provide experimental results based on the implementation of the Bit-Whisper prototype, and examine the channel's properties and limitations. Our experiments included different layouts, with computers positioned at varying distances from one another, and several sensor types and CPU configurations (e.g., Virtual Machines). We also discuss signal modulation and communication protocols, showing how BitWhisper can be used for the exchange of data between two computers in a close proximity (positioned 0-40 cm apart) at an effective rate of 1-8 bits per hour, a rate which makes it possible to infiltrate brief commands and exfiltrate small amount of data (e.g., passwords) over the covert channel.

Cited By

View all
  • (2024)FreeEM: Uncovering Parallel Memory EMR Covert Communication in Volatile EnvironmentsProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661870(372-384)Online publication date: 3-Jun-2024
  • (2023)LoPhy: A Resilient and Fast Covert Channel over LoRa PHYProceedings of the 22nd International Conference on Information Processing in Sensor Networks10.1145/3583120.3586952(1-13)Online publication date: 9-May-2023
  • (2023)ThermWareProceedings of the 24th International Workshop on Mobile Computing Systems and Applications10.1145/3572864.3580339(81-88)Online publication date: 22-Feb-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CSF '15: Proceedings of the 2015 IEEE 28th Computer Security Foundations Symposium
July 2015
504 pages
ISBN:9781467375382

Publisher

IEEE Computer Society

United States

Publication History

Published: 13 July 2015

Author Tags

  1. air-gap
  2. bridging
  3. covert channel
  4. exfiltration
  5. infiltration
  6. sensors
  7. temperature

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)FreeEM: Uncovering Parallel Memory EMR Covert Communication in Volatile EnvironmentsProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661870(372-384)Online publication date: 3-Jun-2024
  • (2023)LoPhy: A Resilient and Fast Covert Channel over LoRa PHYProceedings of the 22nd International Conference on Information Processing in Sensor Networks10.1145/3583120.3586952(1-13)Online publication date: 9-May-2023
  • (2023)ThermWareProceedings of the 24th International Workshop on Mobile Computing Systems and Applications10.1145/3572864.3580339(81-88)Online publication date: 22-Feb-2023
  • (2022)Light AuditorProceedings of the 20th ACM Conference on Embedded Networked Sensor Systems10.1145/3560905.3568535(518-532)Online publication date: 6-Nov-2022
  • (2022)InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped NetworksACM Transactions on Privacy and Security10.1145/351058325:2(1-26)Online publication date: 4-May-2022
  • (2021)USBCulprit: USB-borne Air-Gap MalwareProceedings of the 2021 European Interdisciplinary Cybersecurity Conference10.1145/3487405.3487412(7-13)Online publication date: 10-Nov-2021
  • (2021)LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped SystemsProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3485911(796-811)Online publication date: 6-Dec-2021
  • (2021)Private Data Exfiltration from Cyber-Physical Systems Using Channel State InformationProceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society10.1145/3463676.3485606(223-235)Online publication date: 15-Nov-2021
  • (2021)CapSpeaker: Injecting Voices to Microphones via CapacitorsProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3485389(1915-1929)Online publication date: 12-Nov-2021
  • (2021)OutletSpyProceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3448300.3468291(181-191)Online publication date: 28-Jun-2021
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media