Although organizations are continuously making concerted efforts to harden their systems against network attacks by air-gapping critical systems, attackers continuously adapt and uncover covert channels to exfiltrate data from air-gapped systems. For instance, attackers have demonstrated the feasibility of exfiltrating data from a computer sitting in a Faraday cage by exfiltrating data using magnetic fields. Although a large body of work has recently emerged highlighting various physical covert channels, these attacks have mostly targeted open-loop cyber-physical systems where the covert channels exist on physical channels that are not being monitored by the victim. Network architectures such as fog computing push sensitive data to cyber-physical edge devices--whose physical side channels are typically monitored via state estimation. In this paper, we formalize covert data exfiltration that uses existing cyber-physical models and infrastructure of individual devices to exfiltrate data in a stealthy manner, i.e., we propose a method to circumvent cyber-physical state estimation intrusion detection techniques while exfiltrating sensitive data from the network. We propose a generalized model for encoding and decoding sensitive data within cyber-physical control loops. We evaluate our approach on a distributed IoT network that includes computation nodes residing on physical drones as well as on an industrial control system for the control of a robotic arm. Unlike prior works, we formalize the constraints of covert cyber-physical channel exfiltration in the presence of a defender performing state estimation.
翻译:尽管各组织正在不断作出一致努力,以强化其系统,防止网络攻击,采用空中加载关键系统,但攻击者不断调整和发现隐蔽渠道,以从空中加载系统提取数据。例如,攻击者通过利用磁场从法拉第笼子中提取数据,展示了从一个计算机中提取数据的可行性。虽然最近出现了大量的工作,突出了各种物理隐蔽渠道,但这些攻击大多针对公开的网络物理渠道存在秘密渠道但受害者不监测的网络信息。诸如雾计算敏感数据将敏感数据推向网络物理边缘装置的网络结构通常是通过国家估计加以监测的。在本文件中,我们正式确定秘密数据过滤的可行性,利用现有网络物理模型和个别装置的基础设施,以隐蔽的方式将数据过滤出来,即:我们提出了一种规避网络物理物理估计入侵探测技术的方法,同时从网络中提取敏感数据。我们提出了一个在网络物理边缘设备中进行编码和解密敏感数据的通用模型,而物理侧渠道则通过国家估计来监测。我们用网络物理控制系统内部的保密数据,我们评估了对数据库进行外部控制。