Sniffing Keystrokes With Lasers/Voltmeters



Similar documents
Video eavesdropping- RF

The basic set up for your K2 to run PSK31 By Glenn Maclean WA7SPY

KBA Oktatási Kft OKÉV nyilvántartási szám:

Homebuilt HF Radios for Use Underground Paul R. Jorgenson KE7HR

Study of RF Spectrum Emissions in High Pressure Sodium and Metal Halide Lamps. Lawrence P. Glaister VE7IT, Automation Engineer.

Germanium Diode AM Radio

Wireless Security Camera

Product Information S N O. Portable VIP protection CCTV & Alarm System 2

Displayport Extender via 2 multimode fibers LC Duplex Connector Extends Displayport Link up to 200 meters

Topics in Security: Forensic Signal Analysis

Topics in Security: Forensic Signal Analysis

Design and Certification of ASH Radio Systems for Japan

Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B

Ultra Wideband Signal Impact on IEEE802.11b Network Performance

FIBRE-OPTICS POWER METER INSTRUCTION MANUAL

Demystifying Wireless for Real-World Measurement Applications

Spectrum Analyzer Two models available: OGR-24 (24 GHz) and OGR-8 (8 GHz)

Amplifier for Small Magnetic and Electric Wideband Receiving Antennas (model AAA-1B)

GLOLAB Universal Telephone Hold

ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM MIOR MOHAMMAD HAFIIZH BIN ABD. RANI UNIVERSITI MALAYSIA PAHANG

Networks. The two main network types are: Peer networks

MAINTENANCE & ADJUSTMENT

WATCHWITZ BLAZON WATCHWITZ- BLAZON

Spectrum Analyzer Two models available: OGR-24 (24 GHz) and OGR-8 (8 GHz)

GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM.

AMPLIFIED HIGH SPEED FIBER PHOTODETECTOR USER S GUIDE

UNDERSTANDING AND CONTROLLING COMMON-MODE EMISSIONS IN HIGH-POWER ELECTRONICS

AM TRANSMITTERS & RECEIVERS

How To Sell A Talan

PS 29M DUAL CHANNEL BELTPACK IN METAL CASE

Mobile Device Power Monitor Battery Connection Quick Start Guide

Electronics. Discrete assembly of an operational amplifier as a transistor circuit. LD Physics Leaflets P

INTRUSION ALARM SYSTEM

A CW QRP Transceiver for 20 m band. How it works I'll describe individually the three boards and the relative tuning devices.

INTRODUCTION FIGURE 1 1. Cosmic Rays. Gamma Rays. X-Rays. Ultraviolet Violet Blue Green Yellow Orange Red Infrared. Ultraviolet.

RX-AM4SF Receiver. Pin-out. Connections

USB 3.0* Radio Frequency Interference Impact on 2.4 GHz Wireless Devices

Constructing a precision SWR meter and antenna analyzer. Mike Brink HNF, Design Technologist.

THE FIBRE-OPTICS TRAINER MANUAL

1 All safety instructions, warnings and operating instructions must be read first.

Safety Warnings and Guidelines

HP 8970B Option 020. Service Manual Supplement

Hear The Future...Now! SIEM-2T/SIEM-2R

Connect the EFM32 with a Smart Phone through the Audio Jack

Yerkes Summer Institute 2002

MANUAL FOR RX700 LR and NR

CHAPTER 11: Flip Flops

AN437. Si4432 RF PERFORMANCE AND FCC COMPLIANCE TEST RESULTS. 1. Introduction. 2. Relevant Measurements to comply with FCC

DX AM FM SSB CW PA Amateur Base Station Transceiver OWNER S MANUAL RX / TX 2 4 POWER NF CHANNEL MODE RF POWER OFF CAL OFF OFF CALIBRATE

LDG DTS-4/4R Desktop Coaxial Switch / Remote

TV Remote Controller Decoder

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

Tire pressure monitoring

1. SAFETY INFORMATION

TV hearing aid BL-8008A BL-8008B. Manual

Conference Equipment Rental

Smarthome SELECT Bluetooth Wireless Stereo Audio Receiver and Amplifier INTRODUCTION

GSM Interfacing Board

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Optical Fibres. Introduction. Safety precautions. For your safety. For the safety of the apparatus

Ultrasound Distance Measurement

Side Channel Analysis and Embedded Systems Impact and Countermeasures

User Manual. Please read this manual carefully before using the Phoenix Octopus

Turbo X channel UHF true diversity

Design of Bidirectional Coupling Circuit for Broadband Power-Line Communications

Data Transmission Using Laser Light

MFRD52x. Mifare Contactless Smart Card Reader Reference Design. Document information

Logitech Advanced 2.4 GHz Technology With Unifying Technology

is the power reference: Specifically, power in db is represented by the following equation, where P0 P db = 10 log 10

Wireless Medical Telemetry Laboratory

TELE-SAFE HOME SECURITY SYSTEM

A Low Frequency Adapter for your Vector Network Analyzer (VNA)

AVX EMI SOLUTIONS Ron Demcko, Fellow of AVX Corporation Chris Mello, Principal Engineer, AVX Corporation Brian Ward, Business Manager, AVX Corporation

Wireless Home Security System

OPTICAL FIBERS INTRODUCTION

0HDVXULQJWKHHOHFWULFDOSHUIRUPDQFH FKDUDFWHULVWLFVRI5),)DQGPLFURZDYHVLJQDO SURFHVVLQJFRPSRQHQWV

DRTS 33. The new generation of advanced test equipments for Relays, Energy meters, Transducers and Power quality meters

2100 POS System User Guide

AN003. Evaluation of Anechoic Chambers For EMC Measurements Using A CNE. Overview. CNE III 9kHz to 2GHz Conducted and radiated output

Reducing EMI and Improving Signal Integrity Using Spread Spectrum Clocking

Synthetic Sensing: Proximity / Distance Sensors

RF Power Amplifier PA10W Owner s Manual SpinCore Technologies, Inc.

Intelligent GSM Auto-Dial Alarm System

Lecture 2 Outline. EE 179, Lecture 2, Handout #3. Information representation. Communication system block diagrams. Analog versus digital systems

Nexus Technology Review -- Exhibit A

PUMPED Nd:YAG LASER. Last Revision: August 21, 2007

Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2

H203D 中文 GB Version 1

Basics of Digital Recording

Engineering Sciences 151. Electromagnetic Communication Laboratory Assignment 3 Fall Term

Compact Rugged Design. 300 Memory Channels. Single Head Remote Option. 6 Programmable Function Keys. Enhanced Kenwood Audio. 100W Transmit Power*

PRODUCT SHEET OUT1 SPECIFICATIONS

MEASUREMENT UNCERTAINTY IN VECTOR NETWORK ANALYZER

Tri-Band RF Transceivers for Dynamic Spectrum Access. By Nishant Kumar and Yu-Dong Yao

Guide for wireless environments

Data Acquisition Module with I2C interface «I2C-FLEXEL» User s Guide

POCKET SCOPE 2. The idea 2. Design criteria 3

Tuning a Monopole Antenna Using a Network Analyzer

Evaluating AC Current Sensor Options for Power Delivery Systems

Final Design Report 19 April Project Name: utouch

Transcription:

Sniffing Keystrokes With Lasers/Voltmeters Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage Andrea Barisani Chief Security Engineer Daniele Bianco Hardware Hacker <andrea@inversepath.com> <daniele@inversepath.com> http://www.inversepath.com

Introduction DISCLAIMER: All the equipment and/or circuits and/or schematics provided in the presentation must be treated as examples, use the presented information at your own risk! Safety first! Andrea Barisani <andrea@inversepath.com> Daniele Bianco <daniele@inversepath.com> This work is released under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs License available at http://creativecommons.org/licenses/by-nc-nd/3.0.

Two Unconventional Attacks Attack 1: Power Line Leakage detection against wired PS/2 keyboards Attack 2: Optical Sampling of Mechanical Energy against laptop keyboards

Why bother? Getting bored by software...hardware hacking is good fun! Unconventional side channel attacks Relatively cheap hardware FRIGGING LASER BEAMS! As always...more important: girls will melt when you show this... This is still a work in progress, we are planning to considerably refine the data/equipment presented in the next months

TEMPEST What is TEMPEST? Transmitted Electro-Magnetic Pulse / Energy Standards & Testing Tiny ElectroMagnetic Particles Emitting Secret Things The Emissions Might Produce Extremely Sweet Talks Investigations and studies of Compromising Emanations or Fortuitous Leakage Unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose information The term was coined in the late 60's and early 70's as a codename for the NSA operation to secure electronic communications equipment from potential eavesdroppers

Public Research Relevant to Attack 1 Van Eck, Wim (1985). "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? Kuhn, M.G. (2002). Optical time-domain eavesdropping risks of CRT displays Kuhn, M.G. (2004). Electromagnetic Eavesdropping Risks of Flat-Panel Displays J. Loughry, D. A. Umphress (2002). Information Leakage from Optical Emanations Martin Vuagnoux, Sylvain Pasini (2009). Compromising radiation emanations of wired keyboards

First Attack Theory Keyboard PS/2 cable carries the following wires: Pin 1 Data Pin 3 Ground Pin 4 +5 V DC Pin 5 Clock Pin 2/6 Unused

First Attack Theory The wires are very close to each other and poorly shielded There is a fortuitous leak of information going from the data wire (as well as other sources) to the ground wire and/or cable shielding The ground wire is routed to the main power adapter/cable ground which is then connected to the power socket and then the electric grid DATA CLK V +5 GND cable shielding

First Attack Theory Information about the keystrokes leaks to the electric grid It can be detected on the power outlet, including nearby ones sharing the same electric line The clock frequency of PS/2 signal is lower than any other component or signal emanated from the PC (everything else is tipically above the MHz) Isolate the leakage by filtering out the signal from the noise Profit!

First Attack Theory There is some documentation suggesting the possibility of this attack in literature, though no extensive research is available (maybe some government agency...) While working on this research we had some independent confirmation, at the time the cool preliminary results of Martin Vuagnoux, Sylvain Pasini also suggested that the shared ground may acts as an antenna and significantly improve the range of the attack

The PS/2 Signal Data is transmitted one bit at a time Each byte is sent in a frame consisting of 11-12 (h2d) bits --------------- --------------- ---------------- -------------- ------------ Start (1 bit) Data (8 bits) Parity (1 bit) Stop (1 bit) Ack (1 bit) --------------- --------------- ---------------- -------------- ------------ Letter 'b' (scan code 32): 0 01001100 0 1 1 0 0 1 0 0 1 1 0 0 0 1 The clock frequency range is 10-16.7 khz

Diagram PC GND ~150 Ohm PS/2 Keyboard Vin PS/2 ADC Mouse Vref REFERENCE GND

Testing the Theory We used a digital oscilloscope as ADC for our initial test We route the ground of a nearby power socket to the ADC We measure the current dispersed on the ground using the voltage potential difference between the two ends of the resistor A reference ground clean of electrical system noise is used for improving the measurement (yes, it is weird) nearby power socket refers to anything connected to the same electrical system

The Evil Power Cable

The Reference Ground Sinks and WC are perfect! (hint for spies: hotel rooms have those)...very classy...

The Testing Lab The testing has been performed in a nuclear physics laboratory with lots of particle detectors, power adapters and other noisy equipment running Complex electric grid topology The ground was extremely noisy, substantially more than a normal scenario

Sniffing the Signals Original data

Filtering the Noise We need to find our 10 16.7 khz signal among a huge amount of noise A Finite Impulse Response (FIR) acting as a Band Pass filter selecting frequencies between 1 20 khz is used 1 Msps / 100 ksps is a sufficient rate for the analysis Scilab example: [h,filter_mag,fr] = wfir('bp',order,[.001,.02],'hm',[0,0]);

Filtering the Noise

Results Noisy ground signal

Results Ground noise + filtered signal comparison

Results

Results 0 00111000 0 1 = letter 'a' 0 0 0 1 1 1 0 0 0 0 1

Results Ground noise + filtered signal comparison

Results

Results 0 00111000 0 1 = letter 'a' 0 0 0 1 1 1 0 0 0 0 1

Results

Results

Results 0 01001100 0 1 = letter 'b' 0 0 1 0 0 1 1 0 0 0 1

Estimating Attenuation Attenuation coefficients for wire copper are often estimated for much higher frequencies (>1Mhz) Considering a typical copper cable with a coefficient of 0.1 db after 60m 50% of the signal survives (theoretically!) In our tests we didn't notice significant differences between the signal at 1.5m and 15m A typical signal has an output power of ~1 nw (10^-9 Watt)

Continuous Sniffing Microcontroller Vin ADC (12 bit) PC GND ~150 Ohm PS/2 Keyboard PS/2 1 Msps / 100 Kps Vref Mouse Filtering REFERENCE GND $ 149.99 Storage SD / MMC + Processing SPI Interface

Attack Scenario Depending on the sensitivity of the equipment, keystrokes can be probed from the nearby room or even farther......or power outlets can be tampered with their sniffing version (though this is not really interesting) Appealing alternate targets could be ATM machines that use PS/2 or similar keypads (most ATM are standard PCs) We are confident that more expensive equipment can lead to more precise measurements...the data is (buried) there!

Notes This shouldn't work against USB keyboards because of differential signaling, but still there are some possibilities There might be other factors responsible in minor part for the signal interference on the ground, like power fluctuations of the keyboard microcontroller......these are difficult to pinpoint but they aid the leakage Vuagnoux & Pasini attacks seems more practical (kudos to them!), unless you shield the room walls but forget about the power grid ;), though this attack might have more range the attack definetly deserves more investigation! (which we will continue in the next months)

Workarounds http://www.fickr.com/photos/thefineed1/68647955 http://creativecommons.org/licenses/by-nc-sa/2.0

Public Research Relevant to Attack 2 Dmitri Asonov, Rakesh Agrawal (2004). "Keyboard Acoustic Emanations Li Zhuang, Feng Zhou, J.D. Tygar (2005). Keyboard Acoustic Emanations Revisited these are all brilliant people much more serious than us...kudos to them too!

Second Attack Theory As we cannot use the previous attack on laptops we need something different Previous research addresses keystrokes acoustic Laser microphones can be used for monitoring sounds at a great distance Why not pointing the laser microphone directly at the laptop and sample vibrations? Profit!

Laser Microphone Assembly 1 x Laser (more expensive lasers means more range) 1 x Photoresistor or Photodiode 1 x Resistor 1 x AA Battery $ 79.99 1 x Universal Power Adapter 1 x Jack Cable 1 x Laptop with sound card 2 x Tripod 1 x Focusing lens (for long distances) Optional: amplifier, optical bandpass filter, duct tape...

TX (The Laser) Class IIIR, 670 nm, <5 mw power, <2 mrad divergence (good for short range, 15-30 meters), cheap and poor laser

RX (Photo Detector) BP103 or... Cadmium Sulfide (CdS) Photoresitor or... BPW21R Silicon PN Photodiode BPW21R BP103 CdS

Diagram TX Laser Victim Laptop RX Diode + AA Battery - Audio Jack Mic Jack Attacker's Laptop

The Device

The Device

Audio Detection In order to test the device we first tried with audio A variable resistor helps a lot Good results below 30 meters without any hard core tuning Longer distances requires precise calibration and filtering

Keystrokes Detection We aim the beam directly at the laptop case, generally the LCD display lid Aiming at the top of the lid catches more resonant vibrations (to be substracted later via signal analysis) Aiming closer to the hinges produces better results

Sample - Keystrokes Spacebar

Sample - Keystrokes Spacebar

Sample - Keystrokes It's just like Wheel of Fortune!

Sample - Keystrokes 1 2 3 3? 1 1 1 3 2 It's just like Wheel of Fortune!

Scoring Technique Dynamic Time Warping (DTW) is a good old fashioned technique for measuring the similarity of signals with different time/speed, (HMM should work even better) Generally applied to Audio (speech recognition) and Video

Scoring Results chars 1 <> 7 = 0.066 chars 7 <> 8 = 0.029 chars 8 <> 7 = 0.029 chars 1 <> 8 = 0.072 chars 7 <> 1 = 0.066 chars 8 <> 1 = 0.072 chars 1 <> 3 = 0.167 chars 7 <> 3 = 0.161 chars 8 <> 3 = 0.146 chars 1 <> 10 = 0.188 chars 7 <> 10 = 0.191 chars 8 <> 6 = 0.226 chars 1 <> 6 chars 7 <> 6 chars 8 <> 10 = 0.244 = 0.209 = 0.270 chars 6 <> 10 = 0.160 chars 10 <> 6 = 0.160 chars 11 <> 1 = 0.065 chars 6 <> 1 = 0.209 chars 10 <> 7 = 0.191 chars 11 <> 8 = 0.029 chars 6 <> 8 = 0.226 chars 10 <> 1 = 0.188 chars 11 <> 7 = 0.072 chars 6 <> 7 = 0.270 chars 10 <> 8 = 0.244 chars 11 <> 3 = 0.146 chars 6 <> 3 = 0.343 chars 10 <> 3 = 0.250 chars 11 <> 6 = 0.226 chars 1, 7, 8 and 11 are definetly identical like 6 and 10 char 3 and 4 looks different than anything else final result with complete scoring: 1?XY321 1321

Scoring Results

Scoring Results

Pattern Matching./WoF '1_XY321 1321' /usr/share/dict/american-english hogwash hash (???) salmons sons (???) secrets sets (maybe) sermons sons (???) sockets sets (meh) soviets sets (cold war!) statues sues (well everything sues in America) straits sits (???) subways says (???) tempest test (OMG) tidiest test (meh) tiniest test (meh) trident tent (yeah right...)

Pattern Matching If we spot a 'the' (which is common in the English language) we narrow down the odds to 5 cases Consider that this sample result involves just 2 or 3 words without any previous data (although with 3 common letters spread around) Sampling more words dramatically increases matching Non-word passwords can be narrowed down considerably if a sample of English data is available from the same session

Attack Scenario Laptops Asus EEE PC Reflective Plastic Case PWNED!

Attack Scenario Laptops IBM/Lenovo Thinkpad Logo Wireless Antenna

Attack Scenario Laptops Apple (we always thought that glossy == evil) Glass? Oh yeah! Case, not good The Logo is very good too...

Attack Scenario The Environment Obviously a line-of-sight is needed, either in front or above the target TX / RX can be at completely different locations The more money you throw at the equipment the longer the range Other kinds of laser microphone using interferometry and double transmitters can be used Attack is possible even with a (possibly double) glass window in the way, reflection loss is 4% at every pass Infrared laser can be used for stealthyness

Notes Changing radically typing position (unusual) and mistyping words (very common) decrease accuracy Mistyping can be compensated, neural networks and/or custom dictionaries with key region mappings instead of words can be used for the first pass We believe that previous researches against acoustic emanations can be applied too We know it's hard to get a line of sight for the laser microphone, but it could be really worth it :) (social engineer your victim!)

The End Thanks for listening! - Questions? (shameless plug) http://www.inversepath.com