Data Exfiltration through Electromagnetic Covert Channel of Wired Industrial Control Systems

被引:2
作者
Sachintha, Shakthi [1 ]
Le-Khac, Nhien-An [2 ]
Scanlon, Mark [2 ]
Sayakkara, Asanka P. [1 ]
机构
[1] Univ Colombo Sch Comp UCSC, Colombo 7, Sri Lanka
[2] Univ Coll Dublin, Sch Comp Sci, Forens & Secur Res Grp, Dublin 4, Ireland
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 05期
关键词
covert channel; EM radiation; exfiltration; air-gap; Ethernet; software-defined-radio;
D O I
10.3390/app13052928
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Industrial control systems (ICS) often contain sensitive information related to the corresponding equipment being controlled and their configurations. Protecting such information is important to both the manufacturers and users of such ICSs. This work demonstrates an attack vector on industrial control systems where information can be exfiltrated through a electromagnetic (EM) radiation covert channel from the wired Ethernet connections commonly used by these devices. The attack leverages compromised firmware for the controller-capable of encoding sensitive/critical information into the wired network as packet transmission patterns. The EM radiation from the wired network's communication is captured without direct physical interaction using a portable software-defined radio, and subsequently demodulated on the attacker's computer. This covert channel facilitates the exfiltration of data from a distance of up to two metres with a data rate of 10 bps without any significant data loss. The nature of this covert channel demonstrates that having strong firewalls and network security.
引用
收藏
页数:15
相关论文
共 25 条
[1]   Industrial Control Systems: Cyberattack trends and countermeasures [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Zeadally, Sherali .
COMPUTER COMMUNICATIONS, 2020, 155 :1-8
[2]  
[Anonymous], 1995, 8023U1995 IEEE, V1, P415, DOI [10.1109/IEEESTD.1995.7974916, DOI 10.1109/IEEESTD.1995.7974916]
[3]  
Guri M., 2018, P 2018 16 ANN C PRIV, DOI [10.1109/PST.2018.8514196, DOI 10.1109/PST.2018.8514196]
[4]  
Guri M, 2017, Arxiv, DOI arXiv:1702.06715
[5]  
Guri M, 2018, Arxiv, DOI arXiv:1802.02317
[6]  
Guri M, 2018, Arxiv, DOI arXiv:1802.02700
[7]   LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables Emission [J].
Guri, Mordechai .
2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, :745-754
[8]   PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines [J].
Guri, Mordechai ;
Zadov, Boris ;
Bykhovsky, Dima ;
Elovici, Yuval .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1879-1890
[9]   Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration') [J].
Guri, Mordechai ;
Solewicz, Yosef ;
Daidakulov, Andrey ;
Elovici, Yuval .
COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 :98-115
[10]   BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations [J].
Guri, Mordechai ;
Monitz, Matan ;
Mirski, Yisroel ;
Elovici, Yuval .
2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, :276-289