Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
102 tokens/sec
GPT-4o
59 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
50 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs (2004.06195v1)

Published 13 Apr 2020 in cs.CR

Abstract: Air-gap covert channels are special types of covert communication channels that enable attackers to exfiltrate data from isolated, network-less computers. Various types of air-gap covert channels have been demonstrated over the years, including electromagnetic, magnetic, acoustic, optical, and thermal. In this paper, we introduce a new type of vibrational (seismic) covert channel. We observe that computers vibrate at a frequency correlated to the rotation speed of their internal fans. These inaudible vibrations affect the entire structure on which the computer is placed. Our method is based on malware's capability of controlling the vibrations generated by a computer, by regulating its internal fan speeds. We show that the malware-generated covert vibrations can be sensed by nearby smartphones via the integrated, sensitive \textit{accelerometers}. Notably, the accelerometer sensors in smartphones can be accessed by any app without requiring the user permissions, which make this attack highly evasive. We implemented AiR-ViBeR, malware that encodes binary information, and modulate it over a low frequency vibrational carrier. The data is then decoded by malicious application on a smartphone placed on the same surface (e.g., on a desk). We discuss the attack model, provide technical background, and present the implementation details and evaluation results. Our results show that using AiR-ViBeR, data can be exfiltrated from air-gapped computer to a nearby smartphone on the same table, or even an adjacent table, via vibrations. Finally, we propose a set of countermeasures for this new type of attack.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (1)
  1. Mordechai Guri (36 papers)
Citations (11)

Summary

Analysis of AiR-ViBeR: Exfiltration of Data via Vibrational Covert Channels

The paper "AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs" presents an innovative approach for data exfiltration employing vibrational, specifically seismic, covert channels. The focus of this research is on exfiltrating data from air-gapped computers, utilizing controlled mechanical vibrations induced by the computer's cooling fans. This paper introduces a novel threat vector against isolated systems, illustrating the potential for data leakage through an unconventional medium.

Air-gapped systems remain a staple in protecting highly sensitive organizational assets due to their lack of network connectivity, inherently reducing exposure to remote cyber threats. However, historical data points to numerous instances where air-gapped networks have been breached via sophisticated attack vectors. The AiR-ViBeR approach builds on this premise by demonstrating how data can be transmitted through minimal vibration manipulations without raising suspicion, capitalizing on the innocuity associated with computer fan behavior.

Technical Breakdown

The essence of AiR-ViBeR's method involves the modulation of fan speeds, which creates inaudible vibrational frequencies that propagate through the supporting surface, such as a desk. Importantly, these frequencies correlate to the fan's RPM, allowing for precise control and modulation of binary information. Smartphones, omnipresent in most workplace environments, are leveraged as receivers—specifically utilizing their accelerometers, which inherently do not require user permissions to access under default settings.

The authors have implemented and rigorously evaluated both ASK (Amplitude-shift keying) and FSK (Frequency-shift keying) modulation schemes to encode and transmit data. Their results indicate that data can be reliably exfiltrated at a rate of half a bit per second with data being recoverable on surfaces extending up to 160 cm from the source computer, and maintaining integrity at distances up to approximately 140 cm in certain environments.

Evaluation and Results

The paper details comprehensive experiments evaluating signal-to-noise ratios (SNR) and bit error rates (BER) under different configurations and receiver proximities. The findings suggest the signal's robustness is impacted by the specific physical properties of the desk material and setup, which influences the resonance of vibrations. The empirical results underscore the viability of this tactic in practical settings, although the data rate is modulated by environmental variables and the fidelity of accelerometer readings.

Implications and Future Directions

The introduction of vibrational channels as a medium for data exfiltration interjects a new dimension into the discourse of air-gap security. While traditional networks can be protected with layers of software and hardware defenses, physical phenomena-electro-mechanical byproducts-are exceedingly challenging to regulate without enforcing stringent hardware policies or incurring significant operational costs.

In addressing AiR-ViBeR's implications, the authors suggest several countermeasures, advocating for vibration-resistant design and instrumentation of computing cases, monitoring of anomaly shifts in fan behavior, and potential introduction of active or passive vibration masking technologies. Nonetheless, realizing effective countermeasures without impeding normal operations or escalating expenses presents a complex challenge.

While the paper mentions the difficulty in providing a universal analytic model for this covert communication channel given its dependency on varied physical structures, further exploration into broader environmental and structural modeling remains a crucial area for future exploration. Additionally, expanding research could focus on exploring methods to enhance transmission rates and error detection to bolster the efficacy of vibrational exfiltration in diverse settings.

Conclusion

The research presented in AiR-ViBeR demonstrates a sophisticated yet feasible covert channel leveraging vibrational communication, pushing the boundaries of data exfiltration methods in air-gapped environments. This work not only expands the taxonomy of covert channels but also signifies an urgent call for advancing security measures that account for physical-layer threats, rendering air-gapped systems more resilient against inventive exfiltration strategies.

Youtube Logo Streamline Icon: https://streamlinehq.com