Lend Me Your Ear: Passive Remote Physical Side Channels on PCs

被引:0
|
作者
Genkin, Daniel [1 ]
Nissan, Noam [2 ]
Schuster, Roei [2 ,3 ]
Tromer, Eran [2 ,4 ]
机构
[1] Georgia Tech, Atlanta, GA 30332 USA
[2] Tel Aviv Univ, Tel Aviv, Israel
[3] Cornell Tech, New York, NY USA
[4] Columbia Univ, New York, NY 10027 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show that built-in sensors in commodity PCs, such as microphones, inadvertently capture electromagnetic side-channel leakage from ongoing computation. Moreover, this information is often conveyed by supposedly-benign channels such as audio recordings and common Voice-over-IP applications, even after lossy compression. Thus, we show, it is possible to conduct physical side-channel attacks on computation by remote and purely passive analysis of commonly-shared channels. These attacks require neither physical proximity (which could be mitigated by distance and shielding), nor the ability to run code on the target or configure its hardware. Consequently, we argue, physical side channels on PCs can no longer be excluded from remote-attack threat models. We analyze the computation-dependent leakage captured by internal microphones, and empirically demonstrate its efficacy for attacks. In one scenario, an attacker steals the secret ECDSA signing keys of the counterparty in a voice call. In another, the attacker detects what web page their counterparty is loading. In the third scenario, a player in the Counter-Strike online multiplayer game can detect a hidden opponent waiting in ambush, by analyzing how the 3D rendering done by the opponent's computer induces faint but detectable signals into the opponent's audio feed.
引用
收藏
页码:4437 / 4454
页数:18
相关论文
共 11 条