2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2016
DOI: 10.1109/hst.2016.7495570
|View full text |Cite
|
Sign up to set email alerts
|

Information leakage behind the curtain: Abusing anti-EMI features for covert communication

Abstract: Abstract-We present a new class of covert channels which can be created by utilizing common hardware but that cannot be detected by such. Our idea is to abuse anti-EMI features of a processor to create a covert channel on the physical layer. Thus, the sender uses the invariants in how digital signals are encoded over analog channels to covertly transport information. This leaked data is present on the wire bound connections of the compromised device, but is also by definition present in the vicinity of the dev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 21 publications
(21 reference statements)
0
2
0
Order By: Relevance
“…Other types of magnetic and electric covert channels have been discussed in recent years [12]. Bauer et al discussed the exploitation of anti-EMI features of processors for covert communication [11]. Camurati presented a covert channel that affects mixed-signal chips, where electromagnetic leakage from digital logic is modulated with the radio carrier [13].…”
Section: Related Workmentioning
confidence: 99%
“…Other types of magnetic and electric covert channels have been discussed in recent years [12]. Bauer et al discussed the exploitation of anti-EMI features of processors for covert communication [11]. Camurati presented a covert channel that affects mixed-signal chips, where electromagnetic leakage from digital logic is modulated with the radio carrier [13].…”
Section: Related Workmentioning
confidence: 99%
“…Research on side-and covert-channels on FPGAs and other embedded devices has primarily focused on communications between the device and the outside world. Techniques include varying the power consumption of a device and measuring the impulse response [37], changing how much Electromagnetic Interference is emitted by the device [3], or, in the other direction of communication, measuring voltage [27] and temperature changes [31]. These side-channels can be employed in the context of creating Hardware Trojans (HTs) [19], or as ways to watermark circuits and offer IP protection [5,27].…”
Section: Related Workmentioning
confidence: 99%