2021
DOI: 10.1016/j.future.2020.08.045
|View full text |Cite
|
Sign up to set email alerts
|

MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 31 publications
0
14
0
Order By: Relevance
“…They can be exploited by the attackers to exfiltrate information from isolated and non-networked computers. MAGNETO [35] is a proposal of covert communication about air-gapped systems and nearby smartphones via magnetic fields generated from the CPU. The magnetic signals can be generated from the computers changing the CPU workload, but this covert channel works only for short distances and with low transmission rate.…”
Section: State-of-the-art Literaturementioning
confidence: 99%
“…They can be exploited by the attackers to exfiltrate information from isolated and non-networked computers. MAGNETO [35] is a proposal of covert communication about air-gapped systems and nearby smartphones via magnetic fields generated from the CPU. The magnetic signals can be generated from the computers changing the CPU workload, but this covert channel works only for short distances and with low transmission rate.…”
Section: State-of-the-art Literaturementioning
confidence: 99%
“…Their use in networks protocols was one common application [7] and they have been specially applied in air-gapped computers, that is devices isolated from public or insecure networks. In this vein, a wide array of approaches have been proposed - [8] presents a malware to exfiltrate data through cellular GSM frequencies; [9] through the blinking pattern of keyboard LEDs; [3] through electric emissions on power lines; [4] through the magnetic fields of computers, using a smartphone to receive the covert signals with its magnetic sensor; [10] through the speakers of a computer considering acoustic signals emitted from its hard drive; [11] through the LED of a computer hard drive; [12] through blinking infrarred LEDs of computer devices; [13] through LEDs located in network equipments such as switches or routers; [6] through vibrations by controlling the fan speed of a computer; and [14] through the turn of power supplies into speakers by manipulating their internal switching frequency. With the same purpose but not focusing on air-gapped devices, [15] proposes the use of electromagnetic signals as a covert channel between a laptop and a smartphone.…”
Section: Related Workmentioning
confidence: 99%
“…In essential infrastructures and other corporate environments with highly sensitive information, it is common to have air-gapped systems, that is, computing devices with no network connection. As a result, a great amount of networkless covert channels have been proposed (e.g., [3], [4]).…”
Section: Introductionmentioning
confidence: 99%
“…Intentional security flaws can be used to provide a backdoor to the system or to leak crucial security information (for example, cryptographic keys). For such an application, even a very low bandwidth provided by covert channels can be a severe security threat [ 5 , 6 ]. Sometimes, an intentionally introduced hidden undocumented protocol is provided for valuable purposes such as emergency control protocol, covert authentication, and cryptographic key exchange.…”
Section: Introductionmentioning
confidence: 99%