• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • University Publications
  • QU Forum Proceedings
  • Qatar University Annual Research Forum & Exhibition
  • QUARFE 2020
  • Theme 3: Information and Communication Technologies
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • University Publications
  • QU Forum Proceedings
  • Qatar University Annual Research Forum & Exhibition
  • QUARFE 2020
  • Theme 3: Information and Communication Technologies
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    How to Attack a Disconnected Computer

    Thumbnail
    View/Open
    How to Attack a Disconnected Computer.pdf (2.477Mb)
    Date
    2020
    Author
    Fezooni, Abdulhady younes
    Ghannoum, Ehab Ahmad
    Ayesh, Malek Ahmad
    Malluhi, Qutaibah
    Metadata
    Show full item record
    Abstract
    This poster presents how a disconnected computer, that has no network access, can be attacked to retrieve data. Air-gapped devices are thought to be an impenetrable setup because the device is disconnected from the network and cannot be reached by an attacker. Therefore, an infected air-gapped computer cannot affect others around it preventing any potential information leaks. People believe/assume that leaking information from an air-gapped machine is impossible. This research effort invalidates this assumption by exploring possible covert channels to get data from victim machines. We take advantage of a hidden acoustic channel that employs the computer speakers and a tiny audio recording device to communicate sensitive data over inaudible near-ultrasonic signals. Data stored on this device can then be processed and displayed as useful information on the attacker's computer. Hacking methods and the search for new system exploits are being continuously developed and new techniques to obtain data unlawfully are on the rise. Therefore, this work alerts organizations regarding potential threats that they typically ignore by assuming that air-gapped systems are safe. In the past, security researchers have not devoted sufficient time and effort to innovate counter measures for such niche but capable attacks. Spreading awareness is one of the main objectives of this project. This is done by demonstrating that data can be stolen from an 'air-gapped' computer, by using methods that people neglect to consider when coming up with plans to protect their computers from attackers. An experiment, such as this, will hopefully push the security field researchers and developers to explore the uncommon methods of unlawful data acquisition and their prevention.
    URI
    https://doi.org/10.29117/quarfe.2020.0251
    DOI/handle
    http://hdl.handle.net/10576/16665
    Collections
    • Theme 3: Information and Communication Technologies [‎19‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video