Deep-TEMPEST: Using Deep Learning to Eavesdrop on HDMI from its Unintended Electromagnetic Emanations

Read original: arXiv:2407.09717 - Published 7/16/2024 by Santiago Fern'andez, Emilio Mart'inez, Gabriel Varela, Pablo Mus'e, Federico Larroca
Total Score

295

Deep-TEMPEST: Using Deep Learning to Eavesdrop on HDMI from its Unintended Electromagnetic Emanations

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper discusses a novel technique called "Deep-TEMPEST" that uses deep learning to eavesdrop on HDMI signals by detecting their unintended electromagnetic emanations.
  • The researchers demonstrate that they can reconstruct the visual content of an HDMI connection by analyzing the electromagnetic signals it generates, even when the HDMI cable is shielded.
  • This technique has implications for computer security and privacy, as it could potentially allow attackers to remotely access sensitive information displayed on a target system.

Plain English Explanation

The paper describes a new method called "Deep-TEMPEST" that can use deep learning to eavesdrop on HDMI connections. HDMI is a common way to connect devices like computers and TVs, and it sends digital video and audio signals through the cable.

Even though HDMI cables are designed to be shielded, they still produce small electromagnetic signals that can be detected. The researchers found a way to analyze these electromagnetic signals using a deep learning algorithm. This allows them to reconstruct the visual content being transmitted over the HDMI connection, like what's displayed on a computer screen.

This technique could potentially be used by attackers to remotely access sensitive information on a target system, posing a threat to computer security and privacy. For example, someone could use Deep-TEMPEST to eavesdrop on an HDMI connection and see what's being displayed on a computer, even if the HDMI cable is hidden or secured.

Technical Explanation

The researchers developed a deep learning-based approach called "Deep-TEMPEST" that can reconstruct the visual content of an HDMI connection by analyzing its unintended electromagnetic emanations. They used a convolutional neural network architecture to process the electromagnetic signals captured by an off-the-shelf software-defined radio receiver.

Through extensive experiments, the researchers demonstrated that Deep-TEMPEST can successfully recover the screen content of a target system, even when the HDMI cable is shielded. This includes both static images and dynamic video content. The accuracy of the reconstruction was high, with the system able to correctly identify the displayed content in most cases.

The key insight behind Deep-TEMPEST is that the electromagnetic signals generated by HDMI connections contain patterns that are correlated with the visual data being transmitted. By training a deep learning model to recognize these patterns, the system can effectively eavesdrop on the HDMI connection and reproduce the screen content.

Critical Analysis

The researchers acknowledge several limitations and areas for further research in their paper. For example, they note that Deep-TEMPEST may have difficulty reconstructing content with high temporal changes, such as fast-moving video. Additionally, the system's performance could be affected by factors like the distance between the receiver and the target HDMI connection, as well as the level of electromagnetic interference in the environment.

Further research is needed to improve the robustness and practicality of the Deep-TEMPEST approach. While the researchers demonstrate the feasibility of their technique in a controlled laboratory setting, real-world deployment would likely face additional challenges that need to be addressed.

It's also important to consider the ethical implications of this research and the potential for misuse. The ability to remotely eavesdrop on HDMI connections raises significant privacy and security concerns, and countermeasures may be necessary to mitigate this threat.

Conclusion

The Deep-TEMPEST technique presented in this paper represents a significant advance in the field of side-channel attacks, demonstrating the potential for deep learning to enable new types of eavesdropping and surveillance. While the researchers have shown the feasibility of their approach, further development and careful consideration of the implications are necessary before this technology can be responsibly deployed.

The findings of this paper highlight the ongoing challenges in computer security and the need for continued research to protect against emerging threats to privacy and data confidentiality.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

Deep-TEMPEST: Using Deep Learning to Eavesdrop on HDMI from its Unintended Electromagnetic Emanations
Total Score

295

Deep-TEMPEST: Using Deep Learning to Eavesdrop on HDMI from its Unintended Electromagnetic Emanations

Santiago Fern'andez, Emilio Mart'inez, Gabriel Varela, Pablo Mus'e, Federico Larroca

In this work, we address the problem of eavesdropping on digital video displays by analyzing the electromagnetic waves that unintentionally emanate from the cables and connectors, particularly HDMI. This problem is known as TEMPEST. Compared to the analog case (VGA), the digital case is harder due to a 10-bit encoding that results in a much larger bandwidth and non-linear mapping between the observed signal and the pixel's intensity. As a result, eavesdropping systems designed for the analog case obtain unclear and difficult-to-read images when applied to digital video. The proposed solution is to recast the problem as an inverse problem and train a deep learning module to map the observed electromagnetic signal back to the displayed image. However, this approach still requires a detailed mathematical analysis of the signal, firstly to determine the frequency at which to tune but also to produce training samples without actually needing a real TEMPEST setup. This saves time and avoids the need to obtain these samples, especially if several configurations are being considered. Our focus is on improving the average Character Error Rate in text, and our system improves this rate by over 60 percentage points compared to previous available implementations. The proposed system is based on widely available Software Defined Radio and is fully open-source, seamlessly integrated into the popular GNU Radio framework. We also share the dataset we generated for training, which comprises both simulated and over 1000 real captures. Finally, we discuss some countermeasures to minimize the potential risk of being eavesdropped by systems designed based on similar principles.

Read more

7/16/2024

Modeling Electromagnetic Signal Injection Attacks on Camera-based Smart Systems: Applications and Mitigation
Total Score

0

Modeling Electromagnetic Signal Injection Attacks on Camera-based Smart Systems: Applications and Mitigation

Youqian Zhang, Michael Cheung, Chunxi Yang, Xinwei Zhai, Zitong Shen, Xinyu Ji, Eugene Y. Fu, Sze-Yiu Chau, Xiapu Luo

Numerous safety- or security-critical systems depend on cameras to perceive their surroundings, further allowing artificial intelligence (AI) to analyze the captured images to make important decisions. However, a concerning attack vector has emerged, namely, electromagnetic waves, which pose a threat to the integrity of these systems. Such attacks enable attackers to manipulate the images remotely, leading to incorrect AI decisions, e.g., autonomous vehicles missing detecting obstacles ahead resulting in collisions. The lack of understanding regarding how different systems react to such attacks poses a significant security risk. Furthermore, no effective solutions have been demonstrated to mitigate this threat. To address these gaps, we modeled the attacks and developed a simulation method for generating adversarial images. Through rigorous analysis, we confirmed that the effects of the simulated adversarial images are indistinguishable from those from real attacks. This method enables researchers and engineers to rapidly assess the susceptibility of various AI vision applications to these attacks, without the need for constructing complicated attack devices. In our experiments, most of the models demonstrated vulnerabilities to these attacks, emphasizing the need to enhance their robustness. Fortunately, our modeling and simulation method serves as a stepping stone toward developing more resilient models. We present a pilot study on adversarial training to improve their robustness against attacks, and our results demonstrate a significant improvement by recovering up to 91% performance, offering a promising direction for mitigating this threat.

Read more

8/12/2024

Unveiling the Potential: Harnessing Deep Metric Learning to Circumvent Video Streaming Encryption
Total Score

2

Unveiling the Potential: Harnessing Deep Metric Learning to Circumvent Video Streaming Encryption

Arwin Gansekoele, Tycho Bot, Rob van der Mei, Sandjai Bhulai, Mark Hoogendoorn

Encryption on the internet with the shift to HTTPS has been an important step to improve the privacy of internet users. However, there is an increasing body of work about extracting information from encrypted internet traffic without having to decrypt it. Such attacks bypass security guarantees assumed to be given by HTTPS and thus need to be understood. Prior works showed that the variable bitrates of video streams are sufficient to identify which video someone is watching. These works generally have to make trade-offs in aspects such as accuracy, scalability, robustness, etc. These trade-offs complicate the practical use of these attacks. To that end, we propose a deep metric learning framework based on the triplet loss method. Through this framework, we achieve robust, generalisable, scalable and transferable encrypted video stream detection. First, the triplet loss is better able to deal with video streams not seen during training. Second, our approach can accurately classify videos not seen during training. Third, we show that our method scales well to a dataset of over 1000 videos. Finally, we show that a model trained on video streams over Chrome can also classify streams over Firefox. Our results suggest that this side-channel attack is more broadly applicable than originally thought. We provide our code alongside a diverse and up-to-date dataset for future research.

Read more

5/17/2024

🎲

Total Score

0

Deep-learning-assisted reconfigurable metasurface antenna for real-time holographic beam steering

Hyunjun Ma, Jin-soo Kim, Jong-Ho Choe, Q-Han Park

We propose a metasurface antenna capable of real time holographic beam steering. An array of reconfigurable dipoeles can generate on demand far field patterns of radiation through the specific encoding of meta atomic states. i.e., the configuration of each dipole. Suitable states for the generation of the desired patterns can be identified using iteartion, but this is very slow and needs to be done for each far field pattern. Here, we present a deep learning based method for the control of a metasurface antenna with point dipole elements that vary in their state using dipole polarizability. Instead of iteration, we adopt a deep learning algorithm that combines an autoencoder with an electromagnetic scattering equation to determin the states required for a target far field pattern in real time. The scattering equation from Born approximation is used as the decoder in training the neural network, and analytic Green's function calculation is used to check the validity of Born approximation. Our learning based algorithm requires a computing time of within in 200 microseconds to determine the meta atomic states, thus enabling the real time opeartion of a holographic antenna.

Read more

6/24/2024