With the recent Sony and iCloud breaches, the protection of electronics and data now garners mainstream news headlines. However, researchers at Georgia Tech have begun combatting an entirely new kind of hack. By analyzing the low-power electronic signals from laptops and smartphones, hackers can see what you’re doing—even without hooking up to a potentially unsecure network. Known as side-channel signals, researchers are now investigating where these “information leaks” originate to help hardware and software designers “plug” the gaps.
According to the research team, the side-channel emissions are measurable from several feet away using a variety of methods. Electromagnetic emissions can be received using hidden antennas or acoustic emissions, while sounds produced by electronic components can be picked up by hidden microphones. Also, fake battery chargers plugged into adjacent outlets will measure data on power fluctuations, which translate into the operations performed by computers. Simple AM/FM radios can even pick up some signals.
As part of a demonstration, Alenka Zajic, an assistant professor at Georgia Tech’s School of Electrical and Computer Engineering, modified keyboard software to make the characters easier to identify, showing just how easily it can be done. Nothing was added to the code to raise any serious suspicion—it just looked like a less efficient version of normal keyboard driver software. In many applications, including spell-check, grammar-checking, and display-updating, the existing software contains enough loopholes to carry out an attack.
Watch a video from Georgia Tech on side-channel emissions below: