论文标题
让我们谈谈物理学!秘密的网络物理数据在空调边缘设备上渗透
Let's Talk Through Physics! Covert Cyber-Physical Data Exfiltration on Air-Gapped Edge Devices
论文作者
论文摘要
尽管组织正在不断努力地通过范围的关键系统来加强其系统,以防止网络攻击,但攻击者不断适应并发现秘密渠道,以从空白系统中渗透数据。例如,攻击者证明了使用磁场通过去渗透数据来驱逐数据的计算机中渗透数据的可行性。尽管最近出现了大量的工作,突出了各种物理秘密通道,但这些攻击主要针对开环网络物理系统,在该系统中,秘密通道存在于受害者未经监控的物理通道上。网络体系结构,例如雾计算将敏感数据推向网络物理边缘设备 - 通常通过状态估计来监视物理侧通道。在本文中,我们将使用现有的网络物理模型和单个设备的基础设施进行正式化,以隐秘的方式渗透数据,即,我们提出了一种方法,以绕过网络物理状态估计侵入式检测技术,同时从网络中消除敏感的数据。我们提出了一个通用模型,用于编码和解码网络物理控制环内的敏感数据。我们在分布式的物联网网络上评估了我们的方法,该网络包括位于物理无人机上的计算节点以及用于控制机器人臂的工业控制系统上。与先前的作品不同,我们在存在辩护人执行状态估计的情况下正式化了秘密网络物理通道的限制。
Although organizations are continuously making concerted efforts to harden their systems against network attacks by air-gapping critical systems, attackers continuously adapt and uncover covert channels to exfiltrate data from air-gapped systems. For instance, attackers have demonstrated the feasibility of exfiltrating data from a computer sitting in a Faraday cage by exfiltrating data using magnetic fields. Although a large body of work has recently emerged highlighting various physical covert channels, these attacks have mostly targeted open-loop cyber-physical systems where the covert channels exist on physical channels that are not being monitored by the victim. Network architectures such as fog computing push sensitive data to cyber-physical edge devices--whose physical side channels are typically monitored via state estimation. In this paper, we formalize covert data exfiltration that uses existing cyber-physical models and infrastructure of individual devices to exfiltrate data in a stealthy manner, i.e., we propose a method to circumvent cyber-physical state estimation intrusion detection techniques while exfiltrating sensitive data from the network. We propose a generalized model for encoding and decoding sensitive data within cyber-physical control loops. We evaluate our approach on a distributed IoT network that includes computation nodes residing on physical drones as well as on an industrial control system for the control of a robotic arm. Unlike prior works, we formalize the constraints of covert cyber-physical channel exfiltration in the presence of a defender performing state estimation.