Ghostbuster: Detecting the Presence of Hidden Eavesdroppers

被引:52
作者
Chaman, Anadi [1 ]
Wang, Jiaming [1 ]
Sun, Jiachen [2 ]
Hassanieh, Haitham [1 ]
Choudhury, Romit Roy [1 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
[2] Univ Michigan, Ann Arbor, MI 48109 USA
来源
MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING | 2018年
关键词
Wireless; Security; Eavesdropper;
D O I
10.1115/3211539.3211580
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Tins paper explores the possibility of detecting the hidden presence of wireless eavesdroppers. Such eavesdroppers employ passive receivers that only listen and never transmit any signals making them very hard to detect. In this paper, we show that even passive receivers leak RE signals on the wireless medium. This RE leakage, however, is extremely weak and buried under noise and other transmitted signals that can be 3-5 orders of magnitude larger. illence, it is missed by today's radios. We design and build Ghostbuster, the first device that can reliably extract this leakage, even when it is buried under ongoing transmissions, in order to detect the hidden presence of eavesdroppers. Ghostbuster does not require any modifications to current transmitters and receivers and can accurately detect the eavesdropper in the presence of ongoing transmissions. Empirical results show that Ghostbuster can detect eavesdroppers with more than 95% accuracy up to 5 meters away.
引用
收藏
页码:337 / 351
页数:15
相关论文
共 28 条
[1]  
Adams G., 2013, DAILY MAIL
[2]  
[Anonymous], RADIO TIMES
[3]  
Carter Claire, 2013, The Telegraph
[4]  
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
[5]   Physical Key Extraction Attacks on PCs [J].
Genkin, Daniel ;
Pachmanov, Lev ;
Pipman, Itamar ;
Shamir, Adi ;
Tromer, Eran .
COMMUNICATIONS OF THE ACM, 2016, 59 (06) :70-79
[6]   Get your hands off my laptop: physical side-channel key-extraction attacks on PCs [J].
Genkin, Daniel ;
Pipman, Itamar ;
Tromer, Eran .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2015, 5 (02) :95-112
[7]   Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation [J].
Genkin, Daniel ;
Pachmanov, Lev ;
Pipman, Itamar ;
Tromer, Eran .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :207-228
[8]  
Genkin D, 2014, LECT NOTES COMPUT SC, V8616, P444, DOI 10.1007/978-3-662-44371-2_25
[9]  
Gollakota Shyamnath., 2011, SIGCOMM
[10]  
Hassanieh H., 2015, NSDI