论文标题
撒旦:通过来自SATA电缆的无线电信号的气隙去渗透攻击
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables
论文作者
论文摘要
本文引入了对孤立的,充气工作站的一种新型攻击。尽管气隙计算机没有无线连接,但我们表明攻击者可以将SATA电缆用作无线天线来传输6 GHz频段的无线电信号。串行ATA(SATA)是一个广泛用于现代计算机的总线接口,并将主机总线连接到大量存储设备,例如硬盘驱动器,光学驱动器和固态驱动器。 SATA接口的普遍性使这次攻击在广泛的计算机系统和IT环境中高度可用。我们讨论有关此主题的相关工作并提供技术背景。我们显示了发射器和接收器的设计,并介绍了这些组件的实现。我们还展示了对不同计算机的攻击并提供评估。结果表明,攻击者可以使用SATA电缆将短暂的敏感信息从高度安全的气隙计算机无线转移到附近的接收器。此外,我们表明该攻击可以从用户模式进行,即使在虚拟机(VM)内也有效,并且可以在后台成功使用其他运行的工作负载。最后,我们讨论了这种新的气隙攻击的防御和缓解技术。
This paper introduces a new type of attack on isolated, air-gapped workstations. Although air-gap computers have no wireless connectivity, we show that attackers can use the SATA cable as a wireless antenna to transfer radio signals at the 6 GHz frequency band. The Serial ATA (SATA) is a bus interface widely used in modern computers and connects the host bus to mass storage devices such as hard disk drives, optical drives, and solid-state drives. The prevalence of the SATA interface makes this attack highly available to attackers in a wide range of computer systems and IT environments. We discuss related work on this topic and provide technical background. We show the design of the transmitter and receiver and present the implementation of these components. We also demonstrate the attack on different computers and provide the evaluation. The results show that attackers can use the SATA cable to transfer a brief amount of sensitive information from highly secured, air-gap computers wirelessly to a nearby receiver. Furthermore, we show that the attack can operate from user mode, is effective even from inside a Virtual Machine (VM), and can successfully work with other running workloads in the background. Finally, we discuss defense and mitigation techniques for this new air-gap attack.