Simulation of a Hidden Data Transmission Channel from an Isolated Workstation in the Ultrasonic Frequency Band
DOI:
https://doi.org/10.24160/1993-6982-2025-5-153-159Keywords:
hidden acoustic channel, hidden information leakage channel, malwareAbstract
The aim of the article is to study the procedure for qualifying a facility furnished with a workstation based IT features designed to process confidential information (including the identification of hidden information leakage channels). The mechanism through which a hidden acoustic data transmission channel is established is studied in detail, and its simulation is performed using the binary signal modulation method. A computer program simulating malware that generates high-frequency sound waves, and a test bench have been developed based on the study results. Simulation of a hidden ultrasonic data transmission channel has shown its sufficiently high noise immunity and revealed the extent to which the manifestation of unmasking features depends on the transmission rate (manipulation) and on the emitter type.
References
2. Орлов В.В. Методы скрытой передачи информации в телекоммуникационных сетях: дис. … канд. техн. наук. Самара: Поволжский государственный университет телекоммуникаций и информатики, 2012.
3. Бойчук И. Моделирование акустических каналов утечки информации // Вестник Белгородского гос. технологического ун-та им. В.Г. Шухова. 2016. № 8. С. 176—179.
4. ГОСТ Р 53113.1—2008 Информационная технология. Защита информационных технологий и автоматизированных систем от угроз информационной безопасности, реализуемых с использованием скрытых каналов. Ч. 2. Рекомендации по организации защиты информации, информационных технологий и автоматизированных систем от атак с использованием скрытых каналов.
5. Guri M., Kedma G., Kachlon A., Elovici Y. Airhopper: Bridging the Air-gap Between Isolated Networks and Mobile Phones Using Radio Frequencies // Proc. IX Intern. Conf. Malicious and Unwanted Software: the Americas. 2014. Pp. 58—67.
6. Guri M. e. a. GSMem: Data Exfiltration from Air-gapped Computers over GSM Frequencies // Proc. USENIX Security Symp. 2015. Pp. 849—864.
7. Guri M., Daidakulov A., Elovici Y. Magneto: Covert Channel Between Air-gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields // Future Generation Computer Systems. 2018. V. 115(3). Pp. 1—11.
8. Guri M., Solewicz Y., Elovici Y. Mosquito: Covert Ultrasonic Transmissions Between Two Air-gapped Computers Using Speaker-to-speaker Communication // Proc. IEEE Conf. Dependable and Secure Computing. 2018. Pp. 1—8.
---
Для цитирования: Рыжиков С.С., Агуреев И.А. Моделирование скрытого канала передачи данных из изолированного автоматизированного рабочего места в ультразвуковом диапазоне частот // Вестник МЭИ. 2025. № 5. С. 153—159. DOI: 10.24160/1993-6982-2025-5-153-159
---
Конфликт интересов: авторы заявляют об отсутствии конфликта интересов
#
1. GOST R 53113.1—2008. Informatsionnaya Tekhnologiya. Zashchita Informatsionnykh Tekhnologiy i Avtomatizirovannykh Sistem ot Ugroz Informatsionnoy Bezopasnosti, Realizuemykh s Ispol'zovaniem Skrytykh Kanalov. Ch. 1. Obshchie Polozheniya. (in Russian).
2. Orlov V.V. Metody Skrytoy Peredachi Informatsii v Telekommunikatsionnykh Setyakh: Dis. … Kand. Tekhn. Nauk. Samara: Povolzhskiy Gosudarstvennyy Universitet Telekommunikatsiy i Informatiki, 2012. (in Russian).
3. Boychuk I. Modelirovanie Akusticheskikh Kanalov Utechki Informatsii. Vestnik Belgorodskogo Gos. Tekhnologicheskogo Un-ta im. V.G. Shukhova. 2016;8:176—179. (in Russian).
4. GOST R 53113.1—2008 Informatsionnaya Tekhnologiya. Zashchita Informatsionnykh Tekhnologiy i Avtomatizirovannykh Sistem ot Ugroz Informatsionnoy Bezopasnosti, Realizuemykh s Ispol'zovaniem Skrytykh Kanalov. Ch. 2. Rekomendatsii po Organizatsii Zashchity Informatsii, Informatsionnykh Tekhnologiy i Avtomatizirovannykh Sistem ot Atak s Ispol'zovaniem Skrytykh Kanalov. (in Russian).
5. Guri M., Kedma G., Kachlon A., Elovici Y. Airhopper: Bridging the Air-gap Between Isolated Networks and Mobile Phones Using Radio Frequencies. Proc. IX Intern. Conf. Malicious and Unwanted Software: the Americas. 2014:58—67.
6. Guri M. e. a. GSMem: Data Exfiltration from Air-gapped Computers over GSM Frequencies. Proc. USENIX Security Symp. 2015:849—864.
7. Guri M., Daidakulov A., Elovici Y. Magneto: Covert Channel Between Air-gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields. Future Generation Computer Systems. 2018;115(3):1—11.
8. Guri M., Solewicz Y., Elovici Y. Mosquito: Covert Ultrasonic Transmissions Between Two Air-gapped Computers Using Speaker-to-speaker Communication. Proc. IEEE Conf. Dependable and Secure Computing. 2018:1—8
---
For citation: Ryzhikov S.S., Agureev I.A. Simulation of a Hidden Data Transmission Channel from an Isolated Workstation in the Ultrasonic Frequency Band. Bulletin of MPEI. 2025;5:153—159. (in Russian). DOI: 10.24160/1993-6982-2025-5-153-159
---
Conflict of interests: the authors declare no conflict of interest