loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Thomas Ulz ; Markus Feldbacher ; Thomas Pieber and Christian Steger

Affiliation: Institute of Technical Informatics, Graz University of Technology, Graz and Austria

Keyword(s): Sensor, Exploit, Security, Side-channel, Covert Channel.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Information Assurance ; Information Hiding

Abstract: Recent incidents have shown that sensor-equipped devices can be used by adversaries to perform malicious activities, such as spying on end-users or for industrial espionage. In this paper, we present a novel attack scenario that uses unsecured embedded sensors to build covert channels that can be used to bypass security mechanisms and transfer information between isolated processes. We present covert channels that require read- and write-access for sensor registers as well as a covert channel that transfers data by just triggering sensor readings so that malicious behavior cannot be distinguished from normal sensor usage. For each presented covert channel we discuss the trade-off between data rate and the likelihood of being detected as well as potential countermeasures. The fastest covert channel we implemented achieves a data rate of 4844 bit/s while the stealthiest but slower covert channel cannot be distinguished from normal user behavior. To highlight the significance of these s ecurity issues, we used popular platforms, such as Linux and Android, to evaluate the presented covert channels. However, we do not make any assumption regarding the device’s platform, and thus we believe that the presented exploits pose a significant security risk for any sensor-equipped device. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.188.118.20

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Ulz, T.; Feldbacher, M.; Pieber, T. and Steger, C. (2019). Sensing Danger: Exploiting Sensors to Build Covert Channels. In Proceedings of the 5th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-359-9; ISSN 2184-4356, SciTePress, pages 100-113. DOI: 10.5220/0007353801000113

@conference{icissp19,
author={Thomas Ulz. and Markus Feldbacher. and Thomas Pieber. and Christian Steger.},
title={Sensing Danger: Exploiting Sensors to Build Covert Channels},
booktitle={Proceedings of the 5th International Conference on Information Systems Security and Privacy - ICISSP},
year={2019},
pages={100-113},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007353801000113},
isbn={978-989-758-359-9},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 5th International Conference on Information Systems Security and Privacy - ICISSP
TI - Sensing Danger: Exploiting Sensors to Build Covert Channels
SN - 978-989-758-359-9
IS - 2184-4356
AU - Ulz, T.
AU - Feldbacher, M.
AU - Pieber, T.
AU - Steger, C.
PY - 2019
SP - 100
EP - 113
DO - 10.5220/0007353801000113
PB - SciTePress