2020
DOI: 10.1109/tifs.2019.2938404
|View full text |Cite
|
Sign up to set email alerts
|

ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields

Abstract: Air-gapped computers are computers which are kept isolated from the Internet, because they store and process sensitive information. When highly sensitive data is involved, an air-gapped computer might also be kept secluded in a Faraday cage. The Faraday cage prevents the leakage of electromagnetic signals emanating from various computer parts, which may be picked up by an eavesdropping adversary remotely. The air-gap separation, coupled with the Faraday shield, provides a high level of isolation, preventing th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 62 publications
(28 citation statements)
references
References 46 publications
(52 reference statements)
0
28
0
Order By: Relevance
“…In this type of communication, a malware modulates binary information over the electromagnetic waves radiating from computer components (LCD screens, communication cables, computer buses, and hardware peripherals [12], [13], [14], [15], [16]). Other types of air-gap covert channels based on magnetic [17], [18], acoustic [19], [20] optical, [21] and thermal [22] emissions have also been investigated.…”
Section: B Air-gap Covert Channelsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this type of communication, a malware modulates binary information over the electromagnetic waves radiating from computer components (LCD screens, communication cables, computer buses, and hardware peripherals [12], [13], [14], [15], [16]). Other types of air-gap covert channels based on magnetic [17], [18], acoustic [19], [20] optical, [21] and thermal [22] emissions have also been investigated.…”
Section: B Air-gap Covert Channelsmentioning
confidence: 99%
“…In 2018, Guri et al presented ODINI [17], a malware that can exfiltrate data from air-gapped computers via low frequency magnetic signals generated by the computer's CPU cores. They showed that the low-frequency magnetic fields bypass Faraday cages and metal shields.…”
Section: B Magneticmentioning
confidence: 99%
“…In 2018, Guri et al presented ODINI [31], a malware that can exfiltrate data from air-gapped computers via low frequency magnetic signals generated by the computer's CPU cores. The magnetic fields bypass Faraday cages and metal shields.…”
Section: B Magneticmentioning
confidence: 99%
“…1) ODINI and MAGNETO: The ODINI [55] and MAG-NETO [56] attacks enable the exfiltration of data via magnetic signals generated by the computer processors. Magnetic signals can also be generated from the reading/writing heads of hard disk drives [57].…”
Section: Magenticmentioning
confidence: 99%
“…The Fansmitter and Diskfiltration methods can be used to leak the private keys from an air-gapped wallet in a few minutes. Electromagnetic GSMem (cellular interferences emitted from the CPU-RAM bus) [50] Mobile phone ∼300 sec Electromagnetic RADIoT (radio signals generated by embedded and IoT devices) [51] Mobile phone/ Dedicated receiver ∼1-50 sec Electric PowerHammer (data exfiltrated thorough the power lines) [54] Dedicated receiver ∼ 30-300 sec Magnetic MAGNETO (magnetic signals generated by the CPU to smartphone) [56] ODINI (magnetic signals generated by the CPU) [55] HDD (Magnetic signals emitted from the HDD) -laptops [57] Mobile phone ∼70-1000 sec Acoustic Ultrasonic (generated by loudspeakers) […”
Section: F Acousticmentioning
confidence: 99%