Phones vulnerable to hacking even when Internet is off

According to researchers. hackers may be able to sneak into your laptop or smartphone just by analysing the low-power electronic signals your device emits

Press Trust of India Washington
Last Updated : Jan 09 2015 | 5:06 PM IST
Hackers may be able to sneak into your laptop or smartphone just by analysing the low-power electronic signals your device emits even when it is not connected to the Internet, researchers say.

Researchers at the Georgia Institute of Technology are now investigating where these information "leaks" originate so they can help hardware and software designers develop strategies to plug them.

By studying emissions from multiple computers, the researchers have developed a metric for measuring the strength of the leaks - known technically as "side-channel signal" - to help prioritise security efforts.

Also Read

"People are focused on security for the Internet and on the wireless communication side, but we are concerned with what can be learned from your computer without it intentionally sending anything," said Alenka Zajic, an assistant professor in Georgia Tech's School of Electrical and Computer Engineering.

"Even if you have the Internet connection disabled, you are still emanating information that somebody could use to attack your computer or smartphone," said Zajic.

Side-channel emissions can be measured several feet away from an operating computer using a variety of spying methods. Electromagnetic emissions can be received using antennas hidden in a briefcase, for instance.

Acoustic emissions - sounds produced by electronic components such as capacitors - can be picked up by microphones hidden beneath tables, researchers said.

Information on power fluctuations, which can help hackers determine what the computer is doing, can be measured by fake battery chargers plugged into power outlets adjacent to a laptop's power converter.

Some signals can be picked up by a simple AM/FM radio, while others require more sophisticated spectrum analysers.

And computer components such as voltage regulators produce emissions that can carry signals produced elsewhere in the laptop.

As a demonstration, Zajic typed a simulated password on one laptop that was not connected to the Internet.

On the other side of a wall, a colleague using another disconnected laptop read the password as it was being typed by intercepting side-channel signals produced by the first laptop's keyboard software, which had been modified to make the characters easier to identify.

"There is nothing added in the code to raise suspicion," said Milos Prvulovic, an associate professor in the Georgia Tech School of Computer Science.

"It looks like a correct, but not terribly efficient version of normal keyboard driver software. And in several applications, such as normal spell-checking, grammar-checking and display-updating, the existing software is sufficient for a successful attack," said Prvulovic.

Currently, there is no mention in the open literature of hackers using side-channel attacks, but the researchers believe it is only a matter of time before that happens.
*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Jan 09 2015 | 4:17 PM IST

Next Story