Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers (2012.06884v1)

Published 12 Dec 2020 in cs.CR

Abstract: In this paper, we show that attackers can exfiltrate data from air-gapped computers via Wi-Fi signals. Malware in a compromised air-gapped computer can generate signals in the Wi-Fi frequency bands. The signals are generated through the memory buses - no special hardware is required. Sensitive data can be modulated and secretly exfiltrated on top of the signals. We show that nearby Wi-Fi capable devices (e.g., smartphones, laptops, IoT devices) can intercept these signals, decode them, and send them to the attacker over the Internet. To extract the signals, we utilize the physical layer information exposed by the Wi-Fi chips. We implement the transmitter and receiver and discuss design considerations and implementation details. We evaluate this covert channel in terms of bandwidth and distance and present a set of countermeasures. Our evaluation shows that data can be exfiltrated from air-gapped computers to nearby Wi-Fi receivers located a distance of several meters away.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (1)
  1. Mordechai Guri (36 papers)
Citations (9)

Summary

Overview of "AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers"

The paper "AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers" presents an intriguing exploration into the capabilities of attackers to exfiltrate data from air-gapped systems via Wi-Fi signals without the presence of dedicated Wi-Fi hardware on the compromised systems. This research builds on the specialized field of air-gap security and covert channels, providing a novel method for data transmission that exploits DDR SDRAM buses to emit electromagnetic signals within the 2.4 GHz Wi-Fi bands.

Key Findings and Methodology

The primary assertion of the paper is the exploitation of electromagnetic emissions generated by the DDR SDRAM buses to facilitate data exfiltration. This is achieved without the need for Wi-Fi components by modulating signals through specific memory operations. Notably, the method is robust enough to function on systems running inside virtual machines, significantly broadening its potential applicability.

Experimental Setup and Results

The authors conducted extensive experiments using various workstations to validate the approach. Key performance metrics, such as bandwidth, signal-to-noise ratio (SNR), and bit error rate (BER), were collected and analyzed. The results indicated feasible transmission distances of several meters with bit rates up to 100 bits per second, contingent on the transmission method and receiver capabilities. These findings substantiate the practicality of the AIR-FI channel under typical indoor environments where Wi-Fi devices may be present.

The paper utilized software-defined radio (SDR) receivers and more conventional Wi-Fi adapters to decode the covert signals, demonstrating the method's flexibility in adapting to different receiver technologies. The experiments also highlighted that Wi-Fi monitoring features in Atheros chipsets could be employed to capture this form of covert transmission effectively.

Implications and Countermeasures

The paper discusses the potential implications of the AIR-FI technique, emphasizing both theoretical and practical dimensions. Theoretically, it expands our understanding of air-gap covert channels by introducing electromagnetic-based methods that overlap with the regulated Wi-Fi spectrum. Practically, it suggests a new vector for data leaks from highly secure environments, challenging existing assumptions about air-gap security.

The authors propose several countermeasures, including electromagnetic shielding, runtime anomaly detection, and signal jamming. Each countermeasure offers varying levels of efficacy and operational feasibility, depending on the security requirements and the environmental context.

Future Directions

The research opens avenues for deeper exploration into protecting air-gapped systems from electromagnetic emanation-based threats. Future work could delve into enhancing detection mechanisms for such covert channels, employing more sophisticated signal analysis techniques, and examining the scalability of countermeasures in different operational environments. Additionally, exploring the applicability of these methods to shielded and separated environments will be crucial in augmenting their security posture against such threats.

In conclusion, the AIR-FI paper presents a significant contribution to the domain of covert communication from isolated systems, demonstrating a viable method for data exfiltration via non-standard means. Its findings urge further scrutiny of air-gapped security measures and highlight the continual arms race between defensive strategies and offensive techniques in cybersecurity.

Youtube Logo Streamline Icon: https://streamlinehq.com