Private Data Exfiltration from Cyber-Physical Systems Using Channel State Information

3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data exfiltration methods aim to extract data without authorization from a network or device without detection. In this paper, we present a novel data exfiltration method using Channel State Information (CSI) from ambient WiFi signals. Modulation is performed by modifying the environment by moving a physically actuated machine resulting in a change to the channel response that is measurable by a distant receiver capable of collecting CSI samples. An attacker can use this to exfiltrate data when transmission using conventional methods is impossible, yet the attacker controls a moving mechanism. We discuss the design of the covert channel in detail and produce a proof of concept implementation to evaluate the performance in terms of communication quality. We find that even a simple implementation provides robust communication in an office environment. Additionally, we present several countermeasures against an attack of this type.

Cite

CITATION STYLE

APA

Burton, T., & Rasmussen, K. (2021). Private Data Exfiltration from Cyber-Physical Systems Using Channel State Information. In WPES 2021 - Proceedings of the 20th Workshop on Privacy in the Electronic Society, co-located with CCS 2021 (pp. 223–235). Association for Computing Machinery, Inc. https://doi.org/10.1145/3463676.3485606

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free