Hacking Without the Internet

Monday, January 12, 2015 @ 10:01 AM gHale

Hacking into a computer via the Internet is one thing, but it is also possible to attack a computer or smartphone not connected to the web.

Bad guys may be able to see what you’re doing just by analyzing the low-power electronic signals your laptop or smartphone emit – even if there is no Internet connection.

Need Info? Hack an Exec
Data Loss, Downtime Costs Big Bucks
Breach: When Minutes Count
Data Breach Awareness on Rise

Just where these information “leaks” originate is the idea behind research at Georgia Institute of Technology so investigators can help hardware and software designers develop strategies to plug them. By studying electronic emissions from multiple computers, researchers have developed a metric for measuring the strength of the leaks — known technically as “side-channel signal” — to help prioritize security efforts.

“People are focused on security for the Internet and on the wireless communication side, but we are concerned with what can be learned from your computer without it intentionally sending anything,” said Alenka Zajic, an assistant professor in Georgia Tech’s School of Electrical and Computer Engineering. “Even if you have the Internet connection disabled, you are still emanating information that somebody could use to attack your computer or smartphone.”

Side-channel emissions can end up measured several feet away from an operating computer using a variety of spying methods. An attacker could receive electromagnetic emissions using antennas hidden in a briefcase, for instance. Acoustic emissions — sounds produced by electronic components such as capacitors — can end up retrieved from microphones hidden beneath tables. Information on power fluctuations, which can help hackers determine what the computer is doing, can end up measured by fake battery chargers plugged into power outlets adjacent to a laptop’s power converter.

A simple AM/FM radio can pick up some signals, while others require more sophisticated spectrum analyzers. And computer components such as voltage regulators produce emissions that can carry signals produced elsewhere in the laptop.

As a demonstration, Zajic typed a simulated password on one laptop not connected to the Internet. On the other side of a wall, a colleague using another disconnected laptop read the password as the victim was typing it by intercepting side-channel signals produced by the first laptop’s keyboard software, modified to make the characters easier to identify.

“There is nothing added in the code to raise suspicion,” said Milos Prvulovic, an associate professor in the Georgia Tech School of Computer Science. “It looks like a correct, but not terribly efficient version of normal keyboard driver software. And in several applications, such as normal spell-checking, grammar-checking and display-updating, the existing software is sufficient for a successful attack.”

Currently, there is no mention in the open literature of hackers using side-channel attacks, but the researchers believe it’s only a matter of time before that happens. The potential risks of side-channel emissions released over the years, but not at the level studied by the Georgia Tech researchers.

“Of course, it’s possible that somebody is using it right now, but they are not sharing that information,” Zajic said.

To counter the threat, the researchers are determining where the leaks originate.

“We are trying to understand why these side channels exist and what can be done to fix these leaks,” Zajic said. “We are measuring computers and smartphones to identify the parts of the devices that leak the most. That information can guide efforts to redesign them, and on an architectural level, perhaps change the instructions in the software to change the device behavior.”

Each computer operation has a different potential for leaking information. The processor draws different amounts of current depending on the operation, creating measureable fluctuations. Saving data to memory also requires a large amount of current, creating a “loud” operation.

“When you are executing instructions in the processor, you generate a different type of waveform than if you are doing things in memory,” Zajic said. “And there is interaction between the two.”

To measure the vulnerability, Zajic, Prvulovic and graduate student Robert Callen developed a metric known as “signal available to attacker” (SAVAT), which is a measure of the strength of the signal emitted. They measured the level of SAVAT for 11 different instructions executed on three different laptops, and found the largest signals when the processors accessed off-chip memory.

“It is not really possible to eliminate all side-channel signal,” said Prvulovic. “The trick is to make those signals weak, so potential attackers would have to be closer, use larger antennas and utilize time-consuming signal analyses. We have found that some operations are much ‘louder’ than others, so quieting them would make it more difficult for attackers.”

The researchers are also now studying smartphones, whose compact design and large differential between idle and in-use power may make them more vulnerable. So far, they have only looked at Android devices.

Because the spying is passive and emits no signals itself, users of computers and smartphones wouldn’t know they are falling victim to a sneak attack.

“If somebody is putting strange objects near your computer, you certainly should beware,” said Zajic. “But from the user’s perspective, there is not much they can do right now. Based on our research, we hope to develop something like virus scan software that will look for vulnerability in the code and tell developers what they should update to reduce this vulnerability.”

Leave a Reply

You must be logged in to post a comment.