
The reseachers can monitor an entire system, such as a server, with simple radio antennas (pink).
Credit: Michael Schwettmann
Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.
As far as data security is concerned, there is an even greater danger than remote cyberattacks: namely tampering with hardware that can be used to read out information – such as credit card data from a card reader. Researchers in Bochum have developed a new method to detect such manipulations. They monitor the systems with radio waves that react to the slightest changes in the ambient conditions. Unlike conventional methods, they can thus protect entire systems, not just individual components – and they can do it at a lower cost. The RUB’s science magazine Rubin features a report by the team from Ruhr-Universität Bochum (RUB), the Max Planck Institute for Security and Privacy and the IT company PHYSEC.
Paul Staat and Johannes Tobisch presented their findings at the IEEE Symposium on Security and Privacy, which took place in the USA from 23 to 25 May 2022. Both researchers are doing their PhDs at RUB and conducting research at the Max Planck Institute for Security and Privacy in Bochum in Professor Christof Paar’s team. For their research, they are cooperating with Dr. Christian Zenger from the RUB spin-off company PHYSEC.
Protection through radio waves
Data is ultimately nothing more than electrical currents that travel between different computer components via conductive paths. A tiny metallic object, located in the right place on the hardware, can be enough to tap into the information streams. To date, only individual components of systems, such as a crucial memory element or a processor, can be protected from such manipulations. “Typically, this is done with a type of foil with thin wires in which the hardware component is wrapped,” explains Paul Staat. “If the foil is damaged, an alarm is triggered.”
The radio wave technology from Bochum, however, can be used to monitor an entire system. To this end, the researchers install two antennas in the system: a transmitter and a receiver. The transmitter sends out a special radio signal that spreads everywhere in the system and is reflected by the walls and computer components. All these reflections cause a signal to reach the receiver that is as characteristic of the system as a fingerprint.
Technology reacts to the slightest changes
Tiny changes to the system are enough to have a noticeable effect on the fingerprint, as the team demonstrated in experiments. The IT experts equipped a conventional computer with radio antennas and punctured its housing with holes at regular intervals. Through these holes, the researchers let a fine metal needle penetrate the inside of the system and checked whether they notice the change in the radio signal. In the process, they varied the thickness of the needle, the position and the depth of penetration.
With the computer running, they reliably detected the penetration of a needle 0.3 millimetres thick with their system from a penetration depth of one centimetre. The system still detected a needle that was only 0.1 millimetres thick – about as thick as a hair – but not in all positions. “The closer the needle is to the receiving antenna, the easier it is to detect, explains Staat. “Therefore, in practical applications, it makes sense to think carefully about where you place the antennas,” adds Tobisch. “They should be as close as possible to the components that require a high degree of protection.”
Basically, the technology is suitable for both high-security applications and everyday problem. The IT company PHYSEC already uses it to prevent unauthorised manipulation of critical infrastructure components.
Original Article: Radio waves for the detection of hardware tampering
More from: Ruhr University Bochum | Max Planck Institute for Security and Privacy
The Latest Updates from Bing News & Google News
Go deeper with Bing News on:
Hardware tampering detection
- How Can Energy & Utility Companies Detect Hardware and Software Vulnerabilities in Their Networks?
Organizations that operate ICS and other operational technologies (OT) deploy numerous processes to detect hardware and software vulnerabilities, including security information and event management ...
- Best Pokemon GO Spoofer For ALL Devices[No Detection]
While many of us love exploring our local parks or city centers for Pokemons, sometimes you just wish you could teleport to Tokyo to snag that Farfetch'd or maybe Paris for a Mr. Mime. That's where a ...
- Clover POS Review 2023: Features, Pricing And More
Its hardware devices accept popular payment ... and ships with end-to-end data encryption, tamper detection and access authorization. Clover POS offers phone support to answer customer inquiries.
- Z9 Security certifies Mavin Technologies as z9/op=n for Azure access controllers
The z9/op=n integration not only offers Mavin VARs and customers a wider range of access control hardware options, but also provides ongoing and significant cost and time ...
- Teardown: VeriFone MX 925CTLS Payment Terminal
The ideal solution is to integrate the skimmer hardware directly into the terminal itself so it can’t be seen from the outside. To prevent that sort of tampering, these devices utilize various ...
Go deeper with Google Headlines on:
Hardware tampering detection
[google_news title=”” keyword=”hardware tampering detection” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]
Go deeper with Bing News on:
Radio wave hardware security
- Transition to digital communications pays off for EA security firm
Facing challenges with its analogue two-way radio security network, Senaca EA deployed Motorola Solutions’ Broadband Push-to-Talk technology.
- Building A Hardware Security Module
In the security world, storing passwords in plain text is considered a very bad thing. but luckily there are ways around it. [Stefan]’s solution was to make a hardware security module out of the ...
- Long wave radio fans mourn fading frequencies
Clint Gouveia was only about seven years old at the time, listening to long wave radio in bed, late at night. "I could hear all these voices from far away," he recalls. "It inspired me to want to ...
- radio frequency
Most ham radio operators will build an antenna of some sort when they first start listening or transmitting, whether it’s a simple dipole, a beam antenna like a Yagi, or even just a random wire ...
- Hardware Security Module (HSM) Market research Report with Analysis 2023 To 2030 | Report Pages 105
Recently Updated comprehensive105-Page Reporton the Hardware Security Module (HSM) Market, this analysis deep dives into market size, share, and industry trends. According to our latest research ...
Go deeper with Google Headlines on:
Radio wave hardware security
[google_news title=”” keyword=”radio wave hardware security” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]