Mobile Phones and Laptops vulnerable to hacking even when not connected to Internet

Researchers from Georgia Institute of Technology say thatย hackers may be able to sneak into your laptop or smartphone just by analysing the low-power electronic signals your device emits

Researchers from Georgia Institute of Technology say that hackers can snoop on your laptop or smartphone just by analysing the low power electronic signals emitted by them. ย According to the research paper put on Georgia Institute of Technology’s website they can hack a laptop even when it is not connected to internet.

The Researchersย are now investigating where these information “leaks” originate so they can help hardware and software designers develop strategies to plug them.

By studying emissions from multiple computers, the researchers have developed a metric for measuring the strength of the leaks โ€“ known technically as โ€œside-channel signalโ€ โ€“ to help prioritize security efforts.

The research stated that these “side-channel signals” are very low power electronic signals but powerful enough to provide hackers with the necessary vector to attack a unconnected smartphone or laptop. The researchers say that these side-channel signals can used even to hack passwords.

“Side-channel signals emitted by computers and cellphones could provide hackers with another way to see what the devices are doing. By analyzing the low-power electronic signals emitted by these devices โ€“ even when theyโ€™re not transmitting on the Internet or cellular networks โ€“ hackers can obtain information about computer operations and even track passwords.”

One of the researchers, Alena Zajic who isย assistant professor in Georgia Tech’s School of Electrical and Computer Engineering said thatย “People are focused on security for the Internet and on the wireless communication side, but we are concerned with what can be learned from your computer without it intentionally sending anything,”

“Even if you have the Internet connection disabled, you are still emanating information that somebody could use to attack your computer or smartphone,” said Zajic.

The researchers had presented their demonstrationย presented on December 15 at the 47th Annual IEEE/ACM International Symposium on Microarchitecture in Cambridge, U.K.

The side-channel emissions can be measured several feet away from an operating computer using a variety of spying methods. Electromagnetic emissions can be received using antennas hiddenย in pockets or purses.

The researchers stated that such acoustic emissions which are sounds produced by electronic components such as capacitors can be easily picked up by microphones hidden beneath tables. Once the information is available the hackers can determine what the laptop or smartphone is doing based on the power fluctuations.

The researchers said that some of the signals can be picked up by our normal AM/FM radio transmitters while other require more sophisticated spectrum analysers. For gadgets, the researchers said that computer components likeย voltage regulators produce emissions that can be fetched by hackers.

The video of the demonstration presented by the researchers is given below :

โ€œIt is not really possible to eliminate all side-channel signal,โ€ said Prvulovic. โ€œThe trick is to make those signals weak, so potential attackers would have to be closer, use larger antennas and utilize time-consuming signal analyses. We have found that some operations are much โ€˜louderโ€™ than others, so quieting them would make it more difficult for attackers.โ€

The researchers are also now studying smartphones, whose compact design and large differential between idle and in-use power may make them more vulnerable. So far, they have only looked at Android devices.

Because the spying is passive and emits no signals itself, users of computers and smartphones wouldnโ€™t know theyโ€™re being watched.

โ€œIf somebody is putting strange objects near your computer, you certainly should beware,โ€ said Zajic. โ€œBut from the userโ€™s perspective, there is not much they can do right now. Based on our research, we hope to develop something like virus scan software that will look for vulnerability in the code and tell developers what they should update to reduce this vulnerability.โ€

Subscribe to our newsletter

To be updated with all the latest news

1 COMMENT

  1. Faraday cages. Been using one since the 90s, when I first learnt how to clone a display using EM sniffing.

    Not sure how this is new at all. Yes, the techniques are more advanced, but overall it’s just the same EM leaks we’ve been using for decades.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Subscribe to our newsletter

To be updated with all the latest news

Read More

Suggested Post