Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors (Short Paper)

نویسندگان

  • Sebastian Biedermann
  • Stefan Katzenbeisser
  • Jakub Szefer
چکیده

In this paper we present a new class of side-channel attacks on computer hard drives. Hard drives contain one or more spinning disks made of a magnetic material. In addition, they contain different magnets which rapidly move the head to a target position on the disk to perform a write or a read. The magnetic fields from the disk’s material and head are weak and well shielded. However, we show that the magnetic field due to the moving head can be picked up by sensors outside of the hard drive. With these measurements, we are able to deduce patterns about ongoing operations. For example, we can detect what type of the operating system is booting up or what application is being started. Most importantly, no special equipment is necessary. All attacks can be performed by using an unmodified smartphone placed in proximity of a hard drive.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors

In this paper we present a new class of side-channel attacks on computer hard drives. Hard drives contain one or more spinning disks made of a magnetic material. In addition, they contain different magnets which rapidly move the head to a target position on the disk to perform a write or a read. The magnetic fields from the disk’s material and head are weak and well shielded. However, we show t...

متن کامل

Side-Channel Inference Attacks on Mobile Keypads using Smartwatches

The popularity of smartwatches is soaring with more than 45 million devices expected to be shipped by 2017 [1]. These devices, typically equipped with state-of-the-art sensors and communication capabilities, will enable a plethora of novel applications, including activity tracking, wellness monitoring and ubiquitous computing. However, the presence of a diverse set of on-board sensors also prov...

متن کامل

A Review of Internet of Things Architecture, Technologies and Analysis Smartphone-based Attacks Against 3D printers

Human beings cannot be happy with any kind of tiredness based work, so they focused on machines to work on behalf of humans. The Internet-based latest technology provides the platforms for human beings to relax and unburden feeling. The Internet of Things (IoT) field efficiently helps human beings with smart decisions through Machine-to-Machine (M2M) communication all over the world. It has bee...

متن کامل

DeepMag: Sniffing Mobile Apps in Magnetic Field through Deep Convolutional Neural Networks

In this paper, we report a newfound vulnerability on smartphones due to the malicious use of unsupervised sensor data. We demonstrate that an attacker can train deep Convolutional Neural Networks (CNN) by using magnetometer or orientation data to effectively infer the Apps and their usage information on a smartphone with an accuracy of over 80%. Furthermore, we show that such attacks can become...

متن کامل

DeepML: Deep LSTM for Indoor Localization with Smartphone Magnetic and Light Sensors

With the fast increasing demands of location-based service and proliferation of smartphones and other mobile devices, accurate indoor localization has attracted great interest. In this paper, we present DeepML, a deep long short-term memory (LSTM) based system for indoor localization using the smartphone magnetic and light sensors. We verify the feasibility of using bimodal magnetic and light d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014