Skip to main content

2020 | OriginalPaper | Buchkapitel

2. Data-Driven Attack Modeling Using Acoustic Side-Channel

verfasst von : Sujit Rokka Chhetri, Mohammad Abdullah Al Faruque

Erschienen in: Data-Driven Modeling of Cyber-Physical Systems using Side-Channel Analysis

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber-physical systems consist of a tight integration between computational, communication, and physical components. Due to this, most of the information in the cyber-domain manifests in terms of physical actions (such as motion, temperature change, etc.). However, this interaction may make the system vulnerable to physical-to-cyber domain attacks. These attacks affect the confidentiality of the system by utilizing the physical actions, which are governed by energy flows. Some of these observable energy flows unintentionally leak information about the cyber-domain. These information leaking observable energy flows are known as the side-channels. Side-channels such as acoustic, thermal, and power allow attackers to acquire the information without actually leveraging the vulnerability of the algorithms implemented in the system. In this chapter, we will demonstrate how a data-driven approach can be utilized to model an attack using acoustic side-channel. As a case study, we take cyber-physical additive manufacturing systems (fused deposition modeling based 3D printer) to demonstrate how the acoustic side-channel can be used to breach the confidentiality of the system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Leukers, B., Gülkan, H., Irsen, S. H., Milz, S., Tille, C., Schieker, M., et al. (2005). Hydroxyapatite scaffolds for bone tissue engineering made by 3D printing. Journal of Materials Science: Materials in Medicine, 16(12), 1121–1124. Leukers, B., Gülkan, H., Irsen, S. H., Milz, S., Tille, C., Schieker, M., et al. (2005). Hydroxyapatite scaffolds for bone tissue engineering made by 3D printing. Journal of Materials Science: Materials in Medicine, 16(12), 1121–1124.
2.
Zurück zum Zitat ISS Platform and Feedstock Recycling. (2014). NASA advanced manufacturing technology. ISS Platform and Feedstock Recycling. (2014). NASA advanced manufacturing technology.
3.
4.
Zurück zum Zitat NDIA. (2014). Cyber security for advanced manufacturing. Technical report, National Defense Industrial Association. NDIA. (2014). Cyber security for advanced manufacturing. Technical report, National Defense Industrial Association.
6.
Zurück zum Zitat Yampolskiy, M., Andel, T. R., McDonald, J. T., Glisson, W. B., & Yasinsac, A. (2014). Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop (New York, NY: ACM).CrossRef Yampolskiy, M., Andel, T. R., McDonald, J. T., Glisson, W. B., & Yasinsac, A. (2014). Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop (New York, NY: ACM).CrossRef
7.
Zurück zum Zitat Gibson, I., Rosen, D. W., & Stucker, B. (2014). Additive manufacturing technologies. Berlin: Springer. Gibson, I., Rosen, D. W., & Stucker, B. (2014). Additive manufacturing technologies. Berlin: Springer.
8.
Zurück zum Zitat Ashford, W. (2014). 21 percent of manufacturers hit by intellectual property theft. Ashford, W. (2014). 21 percent of manufacturers hit by intellectual property theft.
9.
Zurück zum Zitat WaII, D. S., & Yar, M. (2010). Intellectual property crime and the internet: cyber-piracy and stealing information intangibles. In Handbook of internet crime (p. 255). WaII, D. S., & Yar, M. (2010). Intellectual property crime and the internet: cyber-piracy and stealing information intangibles. In Handbook of internet crime (p. 255).
10.
Zurück zum Zitat Branigan, T. (2010). Google to end censorship in china over cyber attacks. In The Guardian (p. 01-12). Branigan, T. (2010). Google to end censorship in china over cyber attacks. In The Guardian (p. 01-12).
11.
Zurück zum Zitat Standaert, F.-X., Malkin, T. G., & Yung, M. (2009). A unified framework for the analysis of side-channel key recovery attacks. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer. Standaert, F.-X., Malkin, T. G., & Yung, M. (2009). A unified framework for the analysis of side-channel key recovery attacks. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer.
12.
Zurück zum Zitat Chhetri, S. R., Canedo, A., & Faruque, M. A. A. (2018). Confidentiality breach through acoustic side-channel in cyber-physical additive manufacturing systems. ACM Transaction on Cyber-Physical Systems, 2(1), 3. Chhetri, S. R., Canedo, A., & Faruque, M. A. A. (2018). Confidentiality breach through acoustic side-channel in cyber-physical additive manufacturing systems. ACM Transaction on Cyber-Physical Systems, 2(1), 3.
15.
Zurück zum Zitat Holbrook, T. R., & Osborn, L. S. (2014). Digital patent infringement in an era of 3D printing. UC Davis Law Review, 48, 1319. Holbrook, T. R., & Osborn, L. S. (2014). Digital patent infringement in an era of 3D printing. UC Davis Law Review, 48, 1319.
16.
Zurück zum Zitat Sturm, L. D., Williams, C., Camelio, J., White, J., & Parker, R. (2014). Cyber-physical vulnerabilities in additive manufacturing systems. Context, 7, 8. Sturm, L. D., Williams, C., Camelio, J., White, J., & Parker, R. (2014). Cyber-physical vulnerabilities in additive manufacturing systems. Context, 7, 8.
17.
Zurück zum Zitat Backes, M., Dürmuth, M., Gerling, S., Pinkal, M., & Sporleder, C. (2010). Acoustic side-channel attacks on printers. In USENIX Security Symposium (pp. 307–322). Backes, M., Dürmuth, M., Gerling, S., Pinkal, M., & Sporleder, C. (2010). Acoustic side-channel attacks on printers. In USENIX Security Symposium (pp. 307–322).
18.
Zurück zum Zitat Toreini, E., Randell, B., & Hao, F. (2015). An acoustic side channel attack on enigma. Toreini, E., Randell, B., & Hao, F. (2015). An acoustic side channel attack on enigma.
19.
Zurück zum Zitat Davis, A., Rubinstein, M., Wadhwa, N., Mysore, G. J., Durand, F., & Freeman, W. T. (2014). The visual microphone: Passive recovery of sound from video. ACM Trans. Graph, 33(4), 79CrossRef Davis, A., Rubinstein, M., Wadhwa, N., Mysore, G. J., Durand, F., & Freeman, W. T. (2014). The visual microphone: Passive recovery of sound from video. ACM Trans. Graph, 33(4), 79CrossRef
20.
Zurück zum Zitat Vincent, H., Wells, L., Tarazaga, P., & Camelio, J. (2015). Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing, 1, 77–85.CrossRef Vincent, H., Wells, L., Tarazaga, P., & Camelio, J. (2015). Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing, 1, 77–85.CrossRef
21.
Zurück zum Zitat Hughes, A., & Lawrenson, P. J. (1975). Electromagnetic damping in stepping motors. In Proceedings of the Institution of Electrical Engineers (Vol. 122, pp. 819–824). London, UK: IET. Hughes, A., & Lawrenson, P. J. (1975). Electromagnetic damping in stepping motors. In Proceedings of the Institution of Electrical Engineers (Vol. 122, pp. 819–824). London, UK: IET.
22.
Zurück zum Zitat Kenjō, T., & Sugawara, A. (1994). Stepping motors and their microprocessor controls. Oxford: Oxford University Press. Kenjō, T., & Sugawara, A. (1994). Stepping motors and their microprocessor controls. Oxford: Oxford University Press.
23.
Zurück zum Zitat Yang, S. J. (1981). Low-noise electrical motors (Vol. 13). Oxford: Oxford University Press. Yang, S. J. (1981). Low-noise electrical motors (Vol. 13). Oxford: Oxford University Press.
24.
Zurück zum Zitat Heller, B., & Hamata, V. (1977). Harmonic field effects in induction machines. Amsterdam: Elsevier. Heller, B., & Hamata, V. (1977). Harmonic field effects in induction machines. Amsterdam: Elsevier.
25.
Zurück zum Zitat Gieras, J.F., et al. (2005). Noise of polyphase electric motors. Boca Raton, FL: CRC Press. Gieras, J.F., et al. (2005). Noise of polyphase electric motors. Boca Raton, FL: CRC Press.
26.
Zurück zum Zitat Timár-P, L. T.-P., & Tímár, P. L. (1989). Noise and vibration of electrical machines (Vol. 34). Amsterdam: North Holland. Timár-P, L. T.-P., & Tímár, P. L. (1989). Noise and vibration of electrical machines (Vol. 34). Amsterdam: North Holland.
27.
Zurück zum Zitat So, E. C. T., Williams, R. G. D., & Yang, S. J. (1993). ECT So, RGD Williams, and SJ Yang. A simple model to calculate the stator radial vibration of a hybrid stepping motor. In Conference Record of the 1993 IEEE Industry Applications Society Annual Meeting (pp. 122–129). Piscataway, NJ: IEEE.CrossRef So, E. C. T., Williams, R. G. D., & Yang, S. J. (1993). ECT So, RGD Williams, and SJ Yang. A simple model to calculate the stator radial vibration of a hybrid stepping motor. In Conference Record of the 1993 IEEE Industry Applications Society Annual Meeting (pp. 122–129). Piscataway, NJ: IEEE.CrossRef
28.
Zurück zum Zitat Schafer, R. W., & Oppenheim, A. V. (1989). Discrete-time signal processing (Vol. 2). Englewood Cliffs, NJ: Prentice-Hall.MATH Schafer, R. W., & Oppenheim, A. V. (1989). Discrete-time signal processing (Vol. 2). Englewood Cliffs, NJ: Prentice-Hall.MATH
29.
Zurück zum Zitat Faruque, M. A. A., Chhetri, S. R., et al. (2016). Acoustic side-channel attacks on additive manufacturing systems. In International Conference on Cyber-Physical Systems (ICCPS). Piscataway, NJ: IEEE. Faruque, M. A. A., Chhetri, S. R., et al. (2016). Acoustic side-channel attacks on additive manufacturing systems. In International Conference on Cyber-Physical Systems (ICCPS). Piscataway, NJ: IEEE.
30.
Zurück zum Zitat Theodoridis, S., Pikrakis, A., Koutroumbas, K., & Cavouras, D. (2010). Introduction to Pattern Recognition: A Matlab Approach: A Matlab Approach. London: Academic Press. Theodoridis, S., Pikrakis, A., Koutroumbas, K., & Cavouras, D. (2010). Introduction to Pattern Recognition: A Matlab Approach: A Matlab Approach. London: Academic Press.
31.
Zurück zum Zitat Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O.,et al. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12, 2825–2830.MathSciNetMATH Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O.,et al. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12, 2825–2830.MathSciNetMATH
34.
Zurück zum Zitat MATLAB. (2015). (R2015b). Natick, MA: The MathWorks. MATLAB. (2015). (R2015b). Natick, MA: The MathWorks.
36.
Zurück zum Zitat Barry, D., Coyle, E., & Lawlor, B. (2004). Real-time sound source separation: Azimuth discrimination and resynthesis. In Audio Engineering Society Convention (Vol. 117). New York, NY: Audio Engineering Society. Barry, D., Coyle, E., & Lawlor, B. (2004). Real-time sound source separation: Azimuth discrimination and resynthesis. In Audio Engineering Society Convention (Vol. 117). New York, NY: Audio Engineering Society.
37.
Zurück zum Zitat Syskind, M. P., Larsen, J., Kjems, U., & Parra, L. C. (2007). A survey of convolutive blind source separation methods. In Multichannel Speech Processing Handbook (pp. 1065–1084). Syskind, M. P., Larsen, J., Kjems, U., & Parra, L. C. (2007). A survey of convolutive blind source separation methods. In Multichannel Speech Processing Handbook (pp. 1065–1084).
Metadaten
Titel
Data-Driven Attack Modeling Using Acoustic Side-Channel
verfasst von
Sujit Rokka Chhetri
Mohammad Abdullah Al Faruque
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-37962-9_2

Neuer Inhalt