2018
DOI: 10.48550/arxiv.1802.02317
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6

Relationship

5
1

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 0 publications
0
14
0
Order By: Relevance
“…As it has been discovered in prior work [27,35], the magnetometer on mobile devices is susceptible to the electromagnetic radiation emanated from electronic devices located nearby. In particular, high CPU workload on a device typically requires more power, which results in a higher magnetic eld produced by the powersupplying wires.…”
Section: Reaction Of Magnetometers To Cpu Activitymentioning
confidence: 97%
See 1 more Smart Citation
“…As it has been discovered in prior work [27,35], the magnetometer on mobile devices is susceptible to the electromagnetic radiation emanated from electronic devices located nearby. In particular, high CPU workload on a device typically requires more power, which results in a higher magnetic eld produced by the powersupplying wires.…”
Section: Reaction Of Magnetometers To Cpu Activitymentioning
confidence: 97%
“…to EM activity e reaction of magnetometers to electromagnetic activity emi ed by computer components has been used to establish inter-device covert channels. Researchers used magnetometers to receive covert signals from a nearby computer encoded into hard drive activity [17], CPU activity [27], and combined I/O activity [35]. Recently, Matyunin et al [34] proposed a magnetometer-based intra-device covert channel on smartphones.…”
Section: Exploiting the Reaction Of Magnetometersmentioning
confidence: 99%
“…The same researchers also introduced USBee [9], a malware that used the USB data bus to generate electromagnetic signals to transmit data over the air. In 2018 Guri et al presented ODINI [10] and MAGNETO [11], two attacks that enable the exfiltration of data via magnetic signals generated by the computer CPU cores. The receiver may be a magnetic sensor or a smartphone located near the computer.…”
Section: A Electromagnetic Magnetic Acoustic and Thermalmentioning
confidence: 99%
“…The magnetic fields bypass Faraday cages and metal shields. Guri et al also demonstrated MAGNETO [20], which is a malware that leak data from air-gapped computers to nearby smartphones via magnetic signals. They used the magnetic sensor integrated in smartphones to receive covert signals.…”
Section: B Magneticmentioning
confidence: 99%
“…Magnetic MAGNETO [20] (CPU-generated magnetic fields) ODINI [31] (Faraday shields bypass) Hard-disk-drive [39] Acoustic Fansmitter [27] (computer fan noise) DiskFiltration [28] (hard disk noise) Ultrasonic [33], [13] MOSQUITO (speaker-to-speaker)…”
Section: E Acousticmentioning
confidence: 99%