期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
单片机最小系统的适配驱动器FB120—AC220V
1
作者 吕大明 《国外电子元器件》 2002年第2期69-69,共1页
关键词 单片机 适配驱动器 微机 FB120-AC220V
下载PDF
Powermitter:Data Exfiltration from Air-Gapped Computer through Switching Power Supply 被引量:4
2
作者 Bo Zhao Mingtao Ni Peiru Fan 《China Communications》 SCIE CSCD 2018年第2期170-189,共20页
Air-gapped computers are isolated both logically and physically from all kinds of existing common communication channel, such as USB ports, wireless and wired net- works. Although the feasibility of infiltrating an ai... Air-gapped computers are isolated both logically and physically from all kinds of existing common communication channel, such as USB ports, wireless and wired net- works. Although the feasibility of infiltrating an air-gapped computer has been proved in recent years, data exfiltration from such sys- tems is still considered to be a challenging task. In this paper we present Powermittcr, a novel approach that can exfiltrate data through an air-gapped computer via its power adapter. Our method utilizes the switched-mode pow- er supply, which exists in all of the laptops, desktop computers and servers nowadays. We demonstrate that a malware can indirectly con- trol the electromagnetic emission frequency of the power supply by leveraging the CPU utili- zation. Furthermore, we show that the emitted signals can be received and demodulated by a dedicated device. We present the proof of con- cept design of the power covert channel and implement a prototype of Powermitter consist- ing of a transmitter and a receiver. The trans- mitter leaks out data by using a variant binary frequency shift keying modulation, and the emitted signal can be captured and decoded by software based virtual oscilloscope through such covert channel. We tested Powermitter on three different computers. The experiment re-suits show the feasibility of this power covert channel. We show that our method can also be used to leak data from different types of embedded systems which use switching power supply. 展开更多
关键词 information security covert chan-nel data leakage: air-gapped system
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部