Air-gap Limitations and Bypass Techniques: “Command and Control” using Smart Electromagnetic Interferences

Chaouki Kasmi, José Lopes Esteves, Philippe Valembois

Résumé


Air gaps are generally considered to be a very efficient information security protection. However, this technique also showed limitations, involving finding covert channels for bridging the air gap. Interestingly, recent publications have pointed out that a smart use of the intentional electromagnetic interferences introduced new threats for information security. In this paper, an innovative way for remotely communicating with a malware already installed on a computer by involving the induced perturbations is discussed leading to the design of a new air gap bridging covert channel.

Texte intégral :

PDF (English)


DOI: http://dx.doi.org/10.18464/cybin.v1i1.4

Renvois

  • Il n'y a présentement aucun renvoi.


Licence Creative Commons
Ce(tte) œuvre est mise à disposition selon les termes de la Licence Creative Commons Attribution 4.0 International.

CECyF 2015 - Centre Expert contre la Cybercriminalité Français - CybIN