Air Gap Penetration

Authors(4) :-Pooja Mudgil, Abhishek Raj, Anmol Biswas, Ravikant Kumar

The issue of data security is very paramount for any organization now a day So through this project we will show how an attacker can steal data from the air –gapped channels and also provide some measures in order to protect data from such type of attacks. Now a day attackers can leak data from isolated, air-gapped computers to nearby smart phones via covert magnetic signals. Attacks have been demonstrated on eavesdropping computer displays by utilizing these emissions as a side-channel vector. The accuracy of producing a screen pic depends on the emission sampling rate and bandwidth of the attackers signal hardware. The cost of radio frequency hardware increased with supported frequency range and bandwidth. A number of affordable software defined radio equipment solutions are currently available satisfying a number of radio-focused attacks at a proper price point. This work investigates that the accuracy influencing factors, other than the sample rate and bandwidth, which are noise removal, image blending, and image quality adjustments, that affect the perfection of monitor image reconstruction through electromagnetic side-channel attacks.

Authors and Affiliations

Pooja Mudgil
Department of Information Technology, Bhagwan Parshuram Institute of Technology, Delhi, India
Abhishek Raj
Department of Information Technology, Bhagwan Parshuram Institute of Technology, Delhi, India
Anmol Biswas
Department of Information Technology, Bhagwan Parshuram Institute of Technology, Delhi, India
Ravikant Kumar
Department of Information Technology, Bhagwan Parshuram Institute of Technology, Delhi, India

Air Gap Computers, Electromagnetic Fields, SDR

  1. Furkan Elibol, Uğur Sarac, and Işin Erer. 2012. Realistic Eavesdropping Attacks on Computer Displays with Low-cost and Mobile Receiver System.. IEEE, 1767–1771.
  2. Robin Getz and Bob Moeckel. 1996. Understanding and eliminating EMI in Microcontroller Applications. National Semiconductor (1996).
  3. Yu-ichi Hayashi. 2016. State-of-the-art Research on Electromagnetic Information Security. Radio Science 51, 7 (2016), 1213–1219. https://www.cl.cam.ac.uk/teaching/0910/R08/work/essay-ykrt2-videorf.pdf
  4. Markus Guenther Kuhn. 2002. Compromising Emanations: Eavesdropping Risks of Computer Displays. Ph.D. Dissertation, University of Cambridge. https://www.markscanlon.co/papers/EMAttacksComputerMonitors.pdf
  5. Martin Marinov 2018. TempestSDR Remote Video Eavesdropping using a Software-defined Radio Platform. (2018). https://github.com/martinmarinov/ TempestSDR, Last accessed on 2018-02-01.
  6. Samuel Joseph O’Malley and Kim-Kwang Raymond Choo. 2014. Association for Information Systems.
  7. Michael Ossmann. 2016. Software Defined Radio with HackRF. Great Scott Gadgets, https://greatscottgadgets. com/sdr (2016).
  8. https://www.scmagazineuk.com/does-mosquito-air-gapped-computer-exploit-lack-real-world-bite/article/1473054

Publication Details

Published in : Volume 5 | Issue 2 | March-April 2019
Date of Publication : 2019-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 437-442
Manuscript Number : CSEIT1952109
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Pooja Mudgil, Abhishek Raj, Anmol Biswas, Ravikant Kumar, "Air Gap Penetration", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.437-442, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT1952109
Journal URL : https://res.ijsrcseit.com/CSEIT1952109 Citation Detection and Elimination     |      |          | BibTeX | RIS | CSV

Article Preview