2019 12th CMI Conference on Cybersecurity and Privacy (CMI) 2019
DOI: 10.1109/cmi48017.2019.8962137
|View full text |Cite
|
Sign up to set email alerts
|

Brightness: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness

Abstract: Air-gapped computers are systems that are kept isolated from the Internet since they store or process sensitive information. In this paper, we introduce an optical covert channel in which an attacker can leak (or, exfiltlrate) sensitive information from air-gapped computers through manipulations on the screen brightness. This covert channel is invisible and it works even while the user is working on the computer. Malware on a compromised computer can obtain sensitive data (e.g., files, images, encryption keys … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…In recent years, sound waves, magnetic fields, and heat emissions have also been proposed as covert channels. At the optical domain, leaking information via the keyboard LEDs, hard drive LEDs, and screen power brightness [21] was also proposed. In these methods, binary data is encoded over the activities of the LEDs…”
Section: B Leaking Information From Air-gapped Facilitiesmentioning
confidence: 99%
“…In recent years, sound waves, magnetic fields, and heat emissions have also been proposed as covert channels. At the optical domain, leaking information via the keyboard LEDs, hard drive LEDs, and screen power brightness [21] was also proposed. In these methods, binary data is encoded over the activities of the LEDs…”
Section: B Leaking Information From Air-gapped Facilitiesmentioning
confidence: 99%
“…The hard disk drive (HDD) LEDs [45], router and switch LEDs [44], and security cameras and their IR LEDs [27], also proposed as methods for exfiltrating data from air-gapped networks. Researchers also showed how to exfiltrate data from air-gapped computers via screen brightness [28], and hidden images projected on the screen [31]. BitWhisper is a unique covert channel based on the thermal medium [37].…”
Section: Related Workmentioning
confidence: 99%
“…Reducing network activity in this way can greatly minimize the threat surface of sensitive genetic information. Separating networks and devices from other networks, or air gapping, while using hard drives is possible, but even air-gapped systems have been shown to be vulnerable to compromise (Guri, 2020;Guri et al, 2019). Sequencing devices are still required to be connected to the Internet for maintenance and are often connected between offline operations.…”
Section: Storage and Compute Infrastructurementioning
confidence: 99%