@article{1134, author = {Zihao Zhan and Zhenkai Zhang and Xenofon Koutsoukos}, title = {A High-Speed, Long-Distance and Wall-Penetrating Covert Channel Based on EM Emanations from DRAM Clock}, abstract = {
An air-gapped computer is physically isolated from unsecured networks to guarantee effective protection against data exfiltration. Due to air gaps, unauthorized data transfer seems impossible over legitimate communication channels, but in reality many so-called physical covert channels can be constructed to allow data exfiltration across the air gaps. Most of such covert channels are very slow and often require certain strict conditions to work (e.g., no physical obstacles between the sender and the receiver). In this paper, we introduce a new through-wall physical covert channel named BitJabber that is extremely fast and has a long attacking distance. We show that this covert channel can be easily created by an unprivileged sender running on a victim’s computer. Specifically, the sender constructs the channel by using only memory accesses to modulate the electromagnetic (EM) signals generated by the DRAM clock. While possessing a very high bandwidth (up to 300,000 bps), this new covert channel is also very reliable (less than 1% error rate). More importantly, this covert channel can enable data exfiltration from an air-gapped computer enclosed in a room with thick walls up to 15 cm and the maximum attacking distance is more than 6 m.
}, year = {2022}, journal = {Journal of Hardware and Systems Security}, volume = {6}, month = {08}, url = {https://www.researchgate.net/publication/362602009_A_High-Speed_Long-Distance_and_Wall-Penetrating_Covert_Channel_Based_on_EM_Emanations_from_DRAM_Clock}, doi = {10.1007/s41635-022-00128-6}, }