Reminder: the CovertChannels stuff from Mordechai Guri is a paper mill with misleading titles. Stop giving them publicity. They aren't "Generating Covert Wi-Fi signals", they're encoding 10bps of data in 2.4GHz noise from a 2.4GHz RAM bus. That's not Wi-Fi.
-
Show this thread
-
Literally the guy's entire schtick is picking a random noise/EMI output from a computer (he's done fan noise, HDD LEDs, temperature, etc), figuring out how to write software to encode data in the noise the least-effort amount of way, then pumping out a paper.
5 replies 5 retweets 42 likesShow this thread -
Anyone can come up with this stuff and implement it. Seriously. Like half of the papers only take a few lines of code to implement on both the transmitting and receiving sides (you need malware on both sides).
1 reply 1 retweet 35 likesShow this thread -
I was going to give you some ideas, but he's already done most of them (I looked around, thought "screen brightness" - yup, he did it last year). Uhh, let's see... camera LED! He's done keyboard LEDs, HDD LEDs, router LEDs, but not camera LEDs! Hey Morderai, free paper!
8 replies 0 retweets 44 likesShow this thread -
Here's your leaking code: xxd -c 1 -p secret.txt | while read a; do for b in ${a:0:1} ${a:1:1}; do ffmpeg -y -f v4l2 -i /dev/video0 -t $((0x$b)) -f rawvideo /dev/null ; done; done 4 bits per pulse PWM encoding. Tested on my iMac. There's half of your paper! You're welcome!
11 replies 8 retweets 110 likesShow this thread -
Replying to @marcan42
One idiotic idea I came up with a while back is to spin up a GPU load as a form of on-off keying, and use an SDR to grab the unencrypted signals from a wireless energy monitor to exfiltrate maybe 8 bits per minute.
2 replies 0 retweets 5 likes -
Replying to @gsuberland
He already did a similar one, though it relies on the attacker tapping directly into the power line because he couldn't come up with the wireless energy monitor idea. https://ieeexplore.ieee.org/document/8894040 …
2 replies 0 retweets 7 likes -
Replying to @marcan42 @gsuberland
The word soup in the abstract is amazing, as is the blatant "*Hammer" codename to get clicks via reference to RowHammer (which is orders of magnitude more of an accomplishment than anything this guy ever put out).pic.twitter.com/itL1tnOF7g
2 replies 0 retweets 10 likes -
Replying to @marcan42 @gsuberland
And skimming the paper, I don't think the guy even knows how his attack works. I think he thinks he's getting 20kHz of power consumption modulation to back-propagate through the SMPS. That's extremely unlikely. Much more likely it's just boring old EMI leaking backwards.
1 reply 0 retweets 7 likes -
Replying to @marcan42 @gsuberland
It seems his receiver is a current clamp (i.e. a coil), and he didn't do any actual radio analysis or anything like that, so he probably doesn't have the foggiest idea of where the signal is coming from in reality, just that his coil picks it up. Everything else is an assumption.
1 reply 0 retweets 7 likes
Literally plugged a SparkFun current transformer into the line in jack on a laptop. Academic research doesn't go much lower-tech than that, does it.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.