Skip to content

Commit

Permalink
* update 2024-09-11 06:19:56
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Sep 10, 2024
1 parent e46c1bb commit 32345f3
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 1 deletion.
12 changes: 12 additions & 0 deletions arXiv_db/Malware/2024.md
Original file line number Diff line number Diff line change
Expand Up @@ -2582,3 +2582,15 @@

</details>

<details>

<summary>2024-09-07 23:09:56 - PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via `Singing Pixels'</summary>

- *Mordechai Guri*

- `2409.04930v1` - [abs](http://arxiv.org/abs/2409.04930v1) - [pdf](http://arxiv.org/pdf/2409.04930v1)

> Air-gapped systems are disconnected from the Internet and other networks because they contain or process sensitive data. However, it is known that attackers can use computer speakers to leak data via sound to circumvent the air-gap defense. To cope with this threat, when highly sensitive data is involved, the prohibition of loudspeakers or audio hardware might be enforced. This measure is known as an `audio gap'. In this paper, we present PIXHELL, a new type of covert channel attack allowing hackers to leak information via noise generated by the pixels on the screen. No audio hardware or loudspeakers is required. Malware in the air-gap and audio-gap computers generates crafted pixel patterns that produce noise in the frequency range of 0 - 22 kHz. The malicious code exploits the sound generated by coils and capacitors to control the frequencies emanating from the screen. Acoustic signals can encode and transmit sensitive information. We present the adversarial attack model, cover related work, and provide technical background. We discuss bitmap generation and correlated acoustic signals and provide implementation details on the modulation and demodulation process. We evaluated the covert channel on various screens and tested it with different types of information. We also discuss \textit{evasion and stealth} using low-brightness patterns that appear like black, turned-off screens. Finally, we propose a set of countermeasures. Our test shows that with a PIXHELL attack, textual and binary data can be exfiltrated from air-gapped, audio-gapped computers at a distance of 2m via sound modulated from LCD screens.

</details>

Loading

0 comments on commit 32345f3

Please sign in to comment.