6

[2207.07413] SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cabl...

 1 year ago
source link: https://arxiv.org/abs/2207.07413
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

[Submitted on 15 Jul 2022]

SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables

Download PDF

This paper introduces a new type of attack on isolated, air-gapped workstations. Although air-gap computers have no wireless connectivity, we show that attackers can use the SATA cable as a wireless antenna to transfer radio signals at the 6 GHz frequency band. The Serial ATA (SATA) is a bus interface widely used in modern computers and connects the host bus to mass storage devices such as hard disk drives, optical drives, and solid-state drives. The prevalence of the SATA interface makes this attack highly available to attackers in a wide range of computer systems and IT environments. We discuss related work on this topic and provide technical background. We show the design of the transmitter and receiver and present the implementation of these components. We also demonstrate the attack on different computers and provide the evaluation. The results show that attackers can use the SATA cable to transfer a brief amount of sensitive information from highly secured, air-gap computers wirelessly to a nearby receiver. Furthermore, we show that the attack can operate from user mode, is effective even from inside a Virtual Machine (VM), and can successfully work with other running workloads in the background. Finally, we discuss defense and mitigation techniques for this new air-gap attack.

Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:2207.07413 [cs.CR]
  (or arXiv:2207.07413v1 [cs.CR] for this version)
  https://doi.org/10.48550/arXiv.2207.07413

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK