Do you want to publish a course? Click here

Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop Computers

148   0   0.0 ( 0 )
 Added by Mohammad Islam
 Publication date 2020
and research's language is English




Ask ChatGPT about the research

Attacks based on power analysis have been long existing and studied, with some recent works focused on data exfiltration from victim systems without using conventional communications (e.g., WiFi). Nonetheless, prior works typically rely on intrusive direct power measurement, either by implanting meters in the power outlet or tapping into the power cable, thus jeopardizing the stealthiness of attacks. In this paper, we propose NoDE (Noise for Data Exfiltration), a new system for stealthy data exfiltration from enterprise desktop computers. Specifically, NoDE achieves data exfiltration over a buildings power network by exploiting high-frequency voltage ripples (i.e., switching noises) generated by power factor correction circuits built into todays computers. Located at a distance and even from a different room, the receiver can non-intrusively measure the voltage of a power outlet to capture the high-frequency switching noises for online information decoding without supervised training/learning. To evaluate NoDE, we run experiments on seven different computers from top-vendors and using top brand power supply units. Our results show that for a single transmitter, NoDE achieves a rate of up to 28.48 bits/second with a distance of 90 feet (27.4 meters) without the line of sight, demonstrating a practically stealthy threat. Based on the orthogonality of switching noise frequencies of different computers, we also demonstrate simultaneous data exfiltration from four computers using only one receiver. Finally, we present a few possible defenses, such as installing noise filters, and discuss their limitations.



rate research

Read More

Radio-frequency identification(RFID) technology is widely applied in daily human life. The RFID cards are seen everywhere, from entrance guard to consumption. The information security of RFID cards, such as data confidentiality, tag anonymity, mutual authentication etc, has been fully studied. In the paper, using the RFID cards in MIFARE Classic and DESFire families, a bidirectional covert channel via multipurpose RFID cards between service providers is built to leak sensitive data between two simulation systems. Furthermore, by calculations and experiments, the daily channel capacity to leak data of the channel is obtained. Although the storage capacity of a single RFID card is very small, a large user base can still bring about a considerable amount to leak data. Then, the reasons for the existence of such channels are discussed. To eliminate this type of covert channels, a new authentication protocol between RFID cards and card readers are proposed. Our experimental results show a significant security improvement in prevention of such covert communications while keeping user convenience.
213 - Ning Xie , Qiqi Zhang 2020
In this paper, for overcoming the drawbacks of the prior approaches, such as low generality, high cost, and high overhead, we propose a Low-Cost Anti-Copying (LCAC) 2D barcode by exploiting the difference between the noise characteristics of legal and illegal channels. An embedding strategy is proposed, and for a variant of it, we also make the corresponding analysis. For accurately evaluating the performance of our approach, a theoretical model of the noise in an illegal channel is established by using a generalized Gaussian distribution. By comparing with the experimental results based on various printers, scanners, and a mobile phone, it can be found that the sample histogram and curve fitting of the theoretical model match well, so it can be concluded that the theoretical model works well. For evaluating the security of the proposed LCAC code, besides the direct-copying (DC) attack, the improved version, which is the synthesized-copying (SC) attack, is also considered in this paper. Based on the theoretical model, we build a prediction function to optimize the parameters of our approach. The parameters optimization incorporates the covertness requirement, the robustness requirement and a tradeoff between the production cost and the cost of illegally-copying attacks together. The experimental results show that the proposed LCAC code with two printers and two scanners can detect the DC attack effectively and resist the SC attack up to the access of 14 legal copies.
A significant problem for current quantum computers is noise. While there are many distinct noise channels, the depolarizing noise model often appropriately describes average noise for large circuits involving many qubits and gates. We present a method to mitigate the depolarizing noise by first estimating its rate with a noise-estimation circuit and then correcting the output of the target circuit using the estimated rate. The method is experimentally validated on the simulation of the Heisenberg model. We find that our approach in combination with readout-error correction, randomized compiling, and zero-noise extrapolation produces results close to exact results even for circuits containing hundreds of CNOT gates.
We derive a method to reconstruct Gaussian signals from linear measurements with Gaussian noise. This new algorithm is intended for applications in astrophysics and other sciences. The starting point of our considerations is the principle of minimum Gibbs free energy which was previously used to derive a signal reconstruction algorithm handling uncertainties in the signal covariance. We extend this algorithm to simultaneously uncertain noise and signal covariances using the same principles in the derivation. The resulting equations are general enough to be applied in many different contexts. We demonstrate the performance of the algorithm by applying it to specific example situations and compare it to algorithms not allowing for uncertainties in the noise covariance. The results show that the method we suggest performs very well under a variety of circumstances and is indeed qualitatively superior to the other methods in cases where uncertainty in the noise covariance is present.
167 - Piotr Lubinski 2009
The PICsIT detector onboard the INTEGRAL satellite was designed to provide information about emission in the soft gamma-ray band for many bright sources. Due to strong and variable instrumental background, only 4 objects have been detected so far using standard software. The moderate sensitivity of PICsIT can be compensated for in the case of many objects by adopting a long exposure time, thanks to INTEGRALs large field of view. With angular resolution far higher than that of all other instruments operating in a similar energy band, PICsIT is suitable for fields too crowded or too significantly affected by Galactic diffuse emission. Therefore, it is desirable to improve the spectral extraction software to both obtain more reliable results and enlarge the number of objects that can be studied. The new PICsIT spectral extraction method is based on three elements: careful modelling of the background, an energy-dependent pixel-illumination function, and the computation of the probability density of the source count rate. The most important element is the proper treatment of the Poisson-distributed data, developed within a Bayesian framework. The new method was tested extensively on both a large true data set and simulated data. Results assumed in simulations were reproduced perfectly, without any bias and with high precision. Count rates measured for Crab were far more stable than those obtained with the standard software. For weaker sources, the new method produced spectra of far higher quality and allows us to detect at least 8 additional objects. Comparison with other INTEGRAL instruments demonstrated that PICsIT is well calibrated and provides valuable information about the continuum emission in the 250 keV -- 1 MeV band.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا