Sensing danger: Exploiting sensors to build covert channels

Thomas Ulz, Markus Feldbacher, Thomas Pieber, Christian Steger

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Recent incidents have shown that sensor-equipped devices can be used by adversaries to perform malicious activities, such as spying on end-users or for industrial espionage. In this paper, we present a novel attack scenario that uses unsecured embedded sensors to build covert channels that can be used to bypass security mechanisms and transfer information between isolated processes. We present covert channels that require read- and write-access for sensor registers as well as a covert channel that transfers data by just triggering sensor readings so that malicious behavior cannot be distinguished from normal sensor usage. For each presented covert channel we discuss the trade-off between data rate and the likelihood of being detected as well as potential countermeasures. The fastest covert channel we implemented achieves a data rate of 4844 bit/s while the stealthiest but slower covert channel cannot be distinguished from normal user behavior. To highlight the significance of these security issues, we used popular platforms, such as Linux and Android, to evaluate the presented covert channels. However, we do not make any assumption regarding the device's platform, and thus we believe that the presented exploits pose a significant security risk for any sensor-equipped device.

Original languageEnglish
Title of host publicationICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy
EditorsPaolo Mori, Olivier Camp, Steven Furnell
PublisherSciTePress - Science and Technology Publications
Pages100-113
Number of pages14
ISBN (Electronic)9789897583599
Publication statusPublished - 1 Jan 2019
Event5th International Conference on Information Systems Security and Privacy: ICISSP 2019 - Prague, Czech Republic
Duration: 23 Feb 201925 Feb 2019

Publication series

NameICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy

Conference

Conference5th International Conference on Information Systems Security and Privacy
Abbreviated titleICISSP 2019
Country/TerritoryCzech Republic
CityPrague
Period23/02/1925/02/19

Keywords

  • Covert Channel
  • Exploit
  • Security
  • Sensor
  • Side-channel

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Sensing danger: Exploiting sensors to build covert channels'. Together they form a unique fingerprint.

Cite this