论文标题

电磁信号注入对差分信号的攻击

Electromagnetic Signal Injection Attacks on Differential Signaling

论文作者

Zhang, Youqian, Rasmussen, Kasper

论文摘要

差分信号传导是一种数据传输方法,它使用两个互补的电信号来编码信息。假设噪声以相同的方式影响这两个信号,则可以通过查看两个信号之间的差异来拒绝任何噪声。 USB,以太网和HDMI等许多协议都使用差异信号在嘈杂的环境中实现强大的通信渠道。这通常效果很好,并使许多人认为将攻击信号注入如此差异对是不可行的。在本文中,我们挑战了这一假设,并表明对手实际上可以从远处注入恶意信号,纯粹是使用共同模式注入,即同时注射两条线。我们展示了这允许攻击者将位甚至任意消息注入通信线路。这种攻击是对许多应用程序的重大威胁,从家庭安全和隐私到汽车系统,关键基础设施或可植入的医疗设备;其中错误的数据或未经授权的控制可能会造成重大损害,甚至是致命的事故。 我们详细介绍了电磁信号如何绕过差分信号的噪声排斥的原理,并最终导致接收器中的位置不正确。我们展示了攻击者如何利用这一点以成功地注入任意位,并分析注入更长的任意消息的成功率。我们证明了对真实系统的攻击,并表明成功率可以达到$ 90 \%$。最后,我们提出了一个案例研究,在该案例研究中,我们将消息无线注入控制器区域网络(CAN)总线,这是许多关键应用程序(包括汽车和航空部门)中使用的差异信号总线协议。

Differential signaling is a method of data transmission that uses two complementary electrical signals to encode information. This allows a receiver to reject any noise by looking at the difference between the two signals, assuming the noise affects both signals in the same way. Many protocols such as USB, Ethernet, and HDMI use differential signaling to achieve a robust communication channel in a noisy environment. This generally works well and has led many to believe that it is infeasible to remotely inject attacking signals into such a differential pair. In this paper we challenge this assumption and show that an adversary can in fact inject malicious signals from a distance, purely using common-mode injection, i.e., injecting into both wires at the same time. We show how this allows an attacker to inject bits or even arbitrary messages into a communication line. Such an attack is a significant threat to many applications, from home security and privacy to automotive systems, critical infrastructure, or implantable medical devices; in which incorrect data or unauthorized control could cause significant damage, or even fatal accidents. We show in detail the principles of how an electromagnetic signal can bypass the noise rejection of differential signaling, and eventually result in incorrect bits in the receiver. We show how an attacker can exploit this to achieve a successful injection of an arbitrary bit, and we analyze the success rate of injecting longer arbitrary messages. We demonstrate the attack on a real system and show that the success rate can reach as high as $90\%$. Finally, we present a case study where we wirelessly inject a message into a Controller Area Network (CAN) bus, which is a differential signaling bus protocol used in many critical applications, including the automotive and aviation sector.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源