Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors
نویسندگان
چکیده
In this paper we present a new class of side-channel attacks on computer hard drives. Hard drives contain one or more spinning disks made of a magnetic material. In addition, they contain different magnets which rapidly move the head to a target position on the disk to perform a write or a read. The magnetic fields from the disk’s material and head are weak and well shielded. However, we show that the magnetic field due to the moving head can be picked up by sensors outside of the hard drive. With these measurements, we are able to deduce patterns about ongoing operations. For example, we can detect what type of the operating system is booting up or what application is being started. Most importantly, no special equipment is necessary. All attacks can be performed by using an unmodified smartphone placed in proximity of a hard drive.
منابع مشابه
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors (Short Paper)
In this paper we present a new class of side-channel attacks on computer hard drives. Hard drives contain one or more spinning disks made of a magnetic material. In addition, they contain different magnets which rapidly move the head to a target position on the disk to perform a write or a read. The magnetic fields from the disk’s material and head are weak and well shielded. However, we show t...
متن کاملSide-Channel Inference Attacks on Mobile Keypads using Smartwatches
The popularity of smartwatches is soaring with more than 45 million devices expected to be shipped by 2017 [1]. These devices, typically equipped with state-of-the-art sensors and communication capabilities, will enable a plethora of novel applications, including activity tracking, wellness monitoring and ubiquitous computing. However, the presence of a diverse set of on-board sensors also prov...
متن کاملA Review of Internet of Things Architecture, Technologies and Analysis Smartphone-based Attacks Against 3D printers
Human beings cannot be happy with any kind of tiredness based work, so they focused on machines to work on behalf of humans. The Internet-based latest technology provides the platforms for human beings to relax and unburden feeling. The Internet of Things (IoT) field efficiently helps human beings with smart decisions through Machine-to-Machine (M2M) communication all over the world. It has bee...
متن کاملDeepMag: Sniffing Mobile Apps in Magnetic Field through Deep Convolutional Neural Networks
In this paper, we report a newfound vulnerability on smartphones due to the malicious use of unsupervised sensor data. We demonstrate that an attacker can train deep Convolutional Neural Networks (CNN) by using magnetometer or orientation data to effectively infer the Apps and their usage information on a smartphone with an accuracy of over 80%. Furthermore, we show that such attacks can become...
متن کاملFailure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols. Some of these protocols are suitable for implementation on power constrained devices such as smart cards or smartphone which are subject to side channel attacks. In this paper, we analyse the efficiency of the point blinding countermeasure in pairing based cryptography ag...
متن کامل