Cyber

Sniffing research

by Mark Rowe

MWR Labs – the research and development arm of the information security consultancy MWR InfoSecurity, says that it has taken the first steps towards what it calls a highly non-intrusive method of obtaining and re-creating a storage device’s data which is unavoidably leaked through electromagnetic (EM) radiation.

Near-field analysis is performed to infer (or ‘sniff’) data transferred internally within a device, confirming that resilient systems, such as 4G and similar, are far more vulnerable to attack than was previously thought. Attackers are increasingly gaining access to the sophisticated hardware needed for such an attack, giving them access to (unencrypted) data at a lower level than ever before.

Piotr Osuch, Information Security Researcher of MWR Labs says: “All cryptographic operations within modern data processing and storage devices are physical processes where data elements must be represented by physical quantities in physical structures such as gates and transmission lines. These physical quantities and structures must necessarily have a time- and spatial-extent. As a result, a finite amount of energy must be transmitted during operation, necessarily giving rise to an EM field. The result is an unavoidable leakage of secret information.

“This [MWR Labs] research has formalised our near-field EM analysis methodology, allowing for the non-intrusive sniffing of data at a low abstraction level, and giving security researchers a view of a device’s data transmission under test. At this low level, various security measures are often not yet in place, such as data encryption which is usually done at a later, higher-abstraction stage of the process. If no provision has been made to sufficiently reduce this leaked EM field, then a near-field EM analysis will uncover, at least partially, any secret information being transmitted, allowing organisations to identify where defensive action needs to be taken.

“The hardware required to perform the aforementioned is no longer only accessible to research or government institutes with large budgets but can be afforded by the average fraudster. As a result, there has been a surge in both the sophistication and frequency of EM side-channel attacks, successfully employed to sniff secret information in underlying hardware.

“The additional introspection made possible with this technique allows for more sophisticated attacks, which were previously not possible due to limited output nodes made available via traditional channels. The [MWR Labs] research continues with the aim to add another two degrees of freedom and thus to transform the problem into a four- or five-dimensional vector space by incorporating electronically steerable two-dimensional spatial filtering with resolution of roughly 100 microns. This will allow us to extract data non-intrusively from individual data lines in modern devices.”

Visit: https://labs.mwrinfosecurity.com.

Related News

  • Cyber

    Network joiner

    by Mark Rowe

    Elektrilevi, an Estonian network operator with around 475,000 customers, has joined the European Network for Cyber Security (ENCS). Elektrilevi, which maintains a…

  • Cyber

    Protecting critical infrastructure

    by Mark Rowe

    Critical infrastructure is under the most significant threat since the cold war, writes Josh Breaker-Rolfe. Soaring cybercrime, an increasingly tumultuous geopolitical climate,…

  • Cyber

    Real world cyber risk

    by Mark Rowe

    New cyber risks, data breaches, attack trajectories, and undisclosed vulnerabilities emerge every year, writes Ryan Swann, CEO and founder at RiskSmart. In…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing