2020
DOI: 10.1109/tifs.2019.2952257
|View full text |Cite
|
Sign up to set email alerts
|

PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines

Abstract: In this paper we provide an implementation, evaluation, and analysis of PowerHammer, a malware (bridgeware [1]) that uses power lines to exfiltrate data from air-gapped computers. In this case, a malicious code running on a compromised computer can control the power consumption of the system by intentionally regulating the CPU utilization. Data is modulated, encoded, and transmitted on top of the current flow fluctuations, and then it is conducted and propagated through the power lines. This phenomena is known… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 48 publications
(45 citation statements)
references
References 54 publications
0
42
0
Order By: Relevance
“…Guri et al [33], as well as Islam and Ren [45] demonstrated that current and voltage, respectively, can be monitored and influenced to build covert channels, e.g., in cloud environments. However, both works assume an attacker with hardware equipment connected to the device.…”
Section: A Related Workmentioning
confidence: 99%
“…Guri et al [33], as well as Islam and Ren [45] demonstrated that current and voltage, respectively, can be monitored and influenced to build covert channels, e.g., in cloud environments. However, both works assume an attacker with hardware equipment connected to the device.…”
Section: A Related Workmentioning
confidence: 99%
“…It is well-known that data-dependent power consumption can be used to recover cryptographic keys through differential power analysis and other techniques by acquiring and analyzing power traces [23]. The same principles can be applied to create covert communication, for example from a malware app on a phone to a malicious USB charger [33], or from a program that modulates CPU utilization to an attacker measuring the current consumption of the computer [17]. Similarly, measuring voltage ripple on the power lines can be used to track the power usage pattern of other data center tenants [20].…”
Section: B Power and Temperature Covert Channelsmentioning
confidence: 99%
“…In [22], authors proposed a malware named PowerHammer that uses power lines to exfiltrate sensitive data from a compromised air-gapped computer. An airgapped computer is a computer located in a secured network/environment for which comprehensive security measures are taken into account to maintain both physical and logical separation from less secured computer/environment/networks.…”
Section: B Traditional Computer Networkmentioning
confidence: 99%