Air Gap Penetration

Authors

  • Pooja Mudgil  Department of Information Technology, Bhagwan Parshuram Institute of Technology, Delhi, India
  • Abhishek Raj  Department of Information Technology, Bhagwan Parshuram Institute of Technology, Delhi, India
  • Anmol Biswas  Department of Information Technology, Bhagwan Parshuram Institute of Technology, Delhi, India
  • Ravikant Kumar  Department of Information Technology, Bhagwan Parshuram Institute of Technology, Delhi, India

DOI:

https://doi.org//10.32628/CSEIT1952109

Keywords:

Air Gap Computers, Electromagnetic Fields, SDR

Abstract

The issue of data security is very paramount for any organization now a day So through this project we will show how an attacker can steal data from the air –gapped channels and also provide some measures in order to protect data from such type of attacks. Now a day attackers can leak data from isolated, air-gapped computers to nearby smart phones via covert magnetic signals. Attacks have been demonstrated on eavesdropping computer displays by utilizing these emissions as a side-channel vector. The accuracy of producing a screen pic depends on the emission sampling rate and bandwidth of the attackers signal hardware. The cost of radio frequency hardware increased with supported frequency range and bandwidth. A number of affordable software defined radio equipment solutions are currently available satisfying a number of radio-focused attacks at a proper price point. This work investigates that the accuracy influencing factors, other than the sample rate and bandwidth, which are noise removal, image blending, and image quality adjustments, that affect the perfection of monitor image reconstruction through electromagnetic side-channel attacks.

References

  1. Furkan Elibol, Uğur Sarac, and Işin Erer. 2012. Realistic Eavesdropping Attacks on Computer Displays with Low-cost and Mobile Receiver System.. IEEE, 1767–1771.
  2. Robin Getz and Bob Moeckel. 1996. Understanding and eliminating EMI in Microcontroller Applications. National Semiconductor (1996).
  3. Yu-ichi Hayashi. 2016. State-of-the-art Research on Electromagnetic Information Security. Radio Science 51, 7 (2016), 1213–1219. https://www.cl.cam.ac.uk/teaching/0910/R08/work/essay-ykrt2-videorf.pdf
  4. Markus Guenther Kuhn. 2002. Compromising Emanations: Eavesdropping Risks of Computer Displays. Ph.D. Dissertation, University of Cambridge. https://www.markscanlon.co/papers/EMAttacksComputerMonitors.pdf
  5. Martin Marinov 2018. TempestSDR Remote Video Eavesdropping using a Software-defined Radio Platform. (2018). https://github.com/martinmarinov/ TempestSDR, Last accessed on 2018-02-01.
  6. Samuel Joseph O’Malley and Kim-Kwang Raymond Choo. 2014. Association for Information Systems.
  7. Michael Ossmann. 2016. Software Defined Radio with HackRF. Great Scott Gadgets, https://greatscottgadgets. com/sdr (2016).
  8. https://www.scmagazineuk.com/does-mosquito-air-gapped-computer-exploit-lack-real-world-bite/article/1473054

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
Pooja Mudgil, Abhishek Raj, Anmol Biswas, Ravikant Kumar, " Air Gap Penetration, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.437-442, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT1952109