Next Article in Journal
Numerical Calculation Method of Key Performance Parameters of Proppant Based on 2D Computer Simulation
Previous Article in Journal
Joint Luminance Adjustment and Color Correction for Low-Light Image Enhancement Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

PowerBridge: Covert Air-Gap Exfiltration/Infiltration via Smart Plug

1
College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
2
Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(14), 6321; https://doi.org/10.3390/app14146321
Submission received: 14 May 2024 / Revised: 6 June 2024 / Accepted: 26 June 2024 / Published: 19 July 2024
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)

Abstract

:
Power lines are commonly utilized for energy transmission, and they serve as a conduit for data exfiltration or infiltration in some specific scenarios. This paper explores the feasibility of establishing bidirectional communication between a modified plug and the equipment power line within an air-gapped network organization and with external entities. Bidirectional air-gap communication includes two scenarios, the data leak from air-gapped networks and the transmission of external data to air-gapped networks, namely, exfiltration and infiltration. In the exfiltration scenario, software in the air-gapped networks modulates and encodes data by manipulating the power consumption of the equipment during transmission, which is then sent outside through the power line. The device utilizes a smart plug power meter to record current fluctuations and subsequently decode any leaked data. In the infiltration scenario, a smart plug is used to control the power supply status of a device’s power cord, enabling data encoding and decoding by turning the power supply on and off. The software in the air-gapped equipment captures and decodes the power supply status to infiltrate. We discuss relevant literature and provide scientific background on smart plugs and power line communication. We simulate the communication scenario, propose a communication scheme, and present data modulation techniques as well as a communication transmission protocol for air-gap channels. Our evaluation of the PowerBridge air-gap channels demonstrates that data can leak from the air-gapped computer into the power line at an approximate rate of 30 bps, which can be captured by the smart plug. Additionally, it is possible for data to penetrate from the smart plug into air-gapped networks at a speed exceeding 1 bps.

1. Introduction

The firewall is an access control device that separates internal and external networks, which are typically installed at their intersection points. The most common technology used in firewalls is packet filtering, which involves examining network packets, discarding those that do not comply with the settings, and allowing those that do to pass through. Intruders must first breach the firewall’s security measures in order to gain access to the target computer. By implementing such measures, strict network security policies can be enforced to prevent unauthorized data access. However, despite advancements in new breakthrough technologies and emerging firewalls, they cannot completely eliminate an unauthorized user’s ability to access computers and data [1].
Sensitive and important data should be protected by more secure tools to ensure that internal network data are not leaked or compromised. Many organizations adopt air-gap isolation to improve security, which involves establishing no physical connection between the internal network containing crucial user data and the external Internet, as shown in Figure 1. These works effectively isolate important information from potential threats and significantly enhance security measures. Physical isolation is commonly implemented in government departments, security agencies, business operations planning units, vital scientific research divisions, and similar scenarios.
In the past ten years, it has been proved that hackers’ destructive behavior cannot be completely blocked by firewalls and air-gap isolation. They can still complete the destruction through sophisticated technology, and malware can still infect the organization’s internal network. Computer users’ intentional or unintentional network crossing behavior, as well as the pollution in the software and hardware supply chain, may introduce malicious programs, which may lead to the infection of the entire organization’s intranet [2].

1.1. Network Covert Channel

When malicious programs invade air-gapped networks, they often aim to establish communication channels for command control and data transmission. To avoid triggering security device alarms such as firewalls, malicious programs usually utilize covert channels to establish communication. A network covert channel refers to a channel where the communicating parties encode and transmit information by modifying the value, characteristics, or status of shared resources. Over the years, academia has proposed various types of network covert channels, such as hybrid covert channels and behavioral covert channels [3]. These covert channels can typically evade detection by devices like firewalls in order to achieve long-term control over the target. However, traditional covert channels are based on network connections; without a network environment, an air-gap channel cannot be established.

1.2. Air-Gap Covert Channels

Air-gap isolation has always been considered as a simple and effective means for blocking intrusion, which places important computers in isolated environments without any physical connection to public networks, in order to prevent hackers from damaging or infiltrating them. However, many researchers have posed challenges to such methods. Security researchers have proposed different types of air-gap channels that can breach the air gap and establish communication with computers within an organization. These methods create invisible bridges to bypass the air-gapped system. These publicly available methods can be broadly categorized as follows: electromagnetic channel [4], thermal channel [5], acoustic channel [6], power line channel (PowerHammer) [7], and optical channel [8].

1.3. Smart Plug Security Risks

In recent years, security researchers have discovered that IoT devices commonly possess vulnerabilities that can be exploited remotely [9]. Due to their frequent connection to the Internet, smart plugs have also become a focal point for security researchers [10]. Ling et al. conducted an analysis of a typical smart plug system and, through reverse engineering, revealed its complete communication protocol, while identifying vulnerabilities that could potentially enable remote control of smart plugs [11]. Compromised and controlled smart plugs pose security risks and privacy breaches for home users, as well as potential catastrophic consequences for commercial or industrial users [12]. The safety concerns surrounding smart plugs have garnered significant attention from both industry and academia in recent years [9]. More alarmingly, Microsoft has recently reported that 80% of businesses encountered firmware threats at least once within the past two years [13].
In 2019, the McAfee team found that the Wemo Insight smart plug might be remotely turned off or overloaded; such a vulnerability potentially causes overheating or a power outage in the plug and even serves as a gateway to damage more devices [14]. In 2020, Asif Iqbal et al. conducted a comprehensive analysis of evidence collection for criminal activities using smart plugs [15]. The vulnerability of smart plugs makes them susceptible to remote control. However, there is currently no research on utilizing smart plugs to breach air gaps and establish bidirectional air-gap channels.

1.4. Our Contribution

We propose a new communication model that can bridge the air gap by utilizing smart plugs. Technically, we can achieve air-gapped host data acquisition by monitoring the energy consumption of computers through smart plugs. Additionally, the switch behavior of smart plugs enables us to send commands and data to infected laptops within the air-gap network. We discuss the required software and hardware environment and operations for connecting the air-gapped networks. Furthermore, we propose detection methods and preventive measures for such threatening behaviors.
  • To the best of our knowledge, this is the first air-gap channel that utilizes smart plugs to achieve bidirectional communication through an air-gapped network. It employs smart plugs for power consumption detection and incorporates manufacturing power switches for bidirectional communication. In comparison to the existing PowerHammer method, which enables only one-way communication, our approach achieves bidirectional communication on the laptop end.
  • We conducted extensive experiments on smart plugs and various laptop models to determine the effectiveness and maximum communication speed of PowerBridge.
  • The code does not require special permissions (such as root or administrator). Users can operate from ordinary user-level processes or applications with a wide range of security risks.
  • PowerBridge utilizes a standard CPU to enable air-gap communication, enabling the establishment of communication channels on nearly any computer or device equipped with a CPU.
The rest of this article will have the following arrangement: The second part will elaborate on threat scenarios in detail. Next, in the third section, we will introduce the relevant research results of previous scholars. Subsequently, in the fourth section, we provide the technical background for implementing PowerBridge based on smart plugs. Then, in the fifth section, we discuss issues related to data encoding and decoding. The content of signal generation is described in Section 6. Furthermore, Section 7 provides a detailed introduction to evaluation and analysis methods. Finally, an in-depth discussion is conducted in Section 8, and countermeasures are proposed.

2. Bridge Scenario

We propose an air-gap channel based on smart plugs, which can be applied in two main scenarios; Figure 2 illustrates the exfiltration and infiltration of data. In the data exfiltration scenario, sensitive files or device passwords are leaked from the air-gapped state to the outside. In the infiltration scenario, external data are infiltrated into computer equipment with air-gap isolation.

2.1. Preparation Work

The academic community generally believes that the implementation process of APT can be divided into five steps: information collection, the breakthrough of defense lines, the establishment of channels, horizontal destruction, and external dissemination [16]. In this study, our main focus is on information collection, channel establishment, and information dissemination. Before formal implementation, testers will extensively collect information on specific organizational network systems and related employees and then carry out targeted technical preparation work [17].
After completing technical preparations, malicious attackers will use illegal means such as CD drives, USB devices, supply chain pollution, and social engineering to infiltrate the target’s internal environment with pre-prepared programs, infecting both the target computer and smart plugs. It should be noted that numerous cybersecurity incidents have demonstrated that even networks with robust protection measures can still possess vulnerabilities that may eventually be exploited, leading to network intrusion [18].
After completing these tasks, a foothold can be established within the organization’s internal network for the purpose of information gathering and dissemination.

2.2. Exfiltration

The exfiltration scenario is illustrated in Figure 3. Malicious software actively scans the targeted network for pertinent content and subsequently utilizes a designated mechanism to transmit it to a predetermined destination.
  • Data transmission: Malware utilizes the CPU and other hardware to manipulate power consumption fluctuations in devices, encoding and transmitting data through the power line. The attacker can schedule a specific time for malware transmission or send it after receiving instructions from the attacker, which involves bidirectional communication.
  • Data reception: The signal transmitted by the air-gapped device can be received by the smart plug that provides power to it. Subsequently, the received signal will be recorded and forwarded to the receiver for decoding. The hardware responsible for receiving signals may either be deployed by internal personnel or consist of IoT devices that have already been remotely controlled.

2.3. Infiltration

The infiltration scenario is illustrated in Figure 4. This article assumes the contamination of the smart plug. It is well-known that smart plugs can be remotely controlled by users in real time or programmed to regulate device power supply activation and deactivation. When the power supply of a device is turned off, it ceases to function and becomes detectable by the user. However, laptops powered by batteries do not encounter this issue as they possess both hardware interfaces [19] and software interfaces (ACPI) [20] for monitoring power supply status. By remotely controlling the initiation and termination of the smart plug power supply, laptops can receive information regarding their power supply status, which can then be transmitted to internal software for decoding.

2.4. Dangerous Places

The most critical scenario arises when a computer equipped with air-gap isolation becomes compromised, along with the smart plug that supplies it. This compromise not only ensures the existence of a reliable air-gap channel. Although environments with stringent safety requirements may not incorporate smart plugs within their air-gapped setup, establishing an air-gap channel remains challenging. However, the water pit attack poses a perilous trap [21]. Consider a situation where an unsuspecting victim brings an important computer to an unfamiliar setting like a conference room or hotel and relies on an external power source for energy, as depicted in Figure 5. If this power supply device transforms into a malicious trap, it inadvertently provides avenues for infiltration and data exfiltration.

2.5. Other Methods

This article primarily investigates the bidirectional communication air-gap channel PowerBridge, which is based on smart plugs and focuses on power measurement-enabled IoT devices like smart meters that are extensively utilized in various work and living environments. Figure 6 illustrates the physical object capable of real-time power monitoring for remote devices, converting them into digital quantities [22], facilitating remote automatic meter reading, and efficient data management to enhance customer service. The structure is depicted in Figure 7. Consequently, it becomes feasible to establish an air-gap channel for exfiltration by continuously monitoring the power status on the power line. In a typical scenario where the air-gap-organized smart meter encounters contamination, an alternative approach exists to establish an air-gap channel.

3. Related Work

Covert channels can generally be classified into two types: the first type involves network-based methods, such as modifying TCP and UDP packet structures or exploiting packet time delays and other characteristics. The second type encompasses air-gap channels that leverage the physical properties of devices, including sound, light, magnetism, and heat. In scenarios where sensitive and critical computers are prohibited from connecting to external networks, establishing the first type of air-gap channel becomes infeasible; hence, researchers focus on exploring the possibilities of establishing the second type.
Air-gap channels can be established by transmitting signals such as electromagnetic, acoustic, optical, and power line signals.
The utilization of electromagnetic signals to establish air-gap channels has a long-standing history, yet researchers continue to explore novel methodologies in this field. In 2020, Zhang, Zhao et al. demonstrated BitJabber [23], the utilization of memory access for modulating electromagnetic (EM) signals generated by DRAM clocks to construct channels with a bandwidth reaching up to 300,000 bps and the capability to penetrate concrete walls up to 15 cm thick.
In 2022, Guri et al. developed AIR-FI [24], which enables signal transmission exclusively through a memory bus and the interception of these signals via devices equipped with WiFi capabilities, such as smartphones, laptops, and IoT devices. In 2024, Guri et al. discovered RAMBO [25], which generates radio signals from the memory bus (RAM) and employs software-defined radio (SDR) hardware along with readily available antennas for signal reception at communication speeds of up to 1000 bit/s.
Vibration and sound waves offer alternative approaches. In 2021, Guri successfully addressed the air-gap channel by utilizing vibration, enabling Air-ViBeR [26] to adjust its internal fan speed through acceleration sensors in smartphones for signal reception. In 2019, Giechaskiel et al. examined the technique of signal injection using mobile phone microphones [27]. In 2022, de Gortari Briseno et al. demonstrated InkFiltration [28], a method employing malicious software to generate specific sound signals during computer printing that can be captured and decoded by nearby acoustic recording devices like smartphones; it achieves a communication distance of up to 4 m with an average bit rate of approximately 0.5 bps.
Optics offers an alternative approach. In 2021, Niclas et al. demonstrated LaserShark [29], a technique that utilizes modulated laser aiming devices to operate LEDs on the CPU GPIO interface and capture their flicker, enabling long-distance (25 m), bidirectional air-gap communication channels. In 2022, Guri et al. presented ETHERLED [30], which manipulates the flashing and alternating colors of Network Interface Controller (NIC) LEDs through malicious software to transmit signals. In 2023, Schlauder et al. introduced CD-BLink [31], as a method for extracting data from an air-gap network by modulating the read and write LEDs on an optical drive.
In 2018, Guri et al. demonstrated that PowerHammer [7] effectively regulates system power consumption by deliberately adjusting CPU utilization. The data are modulated, encoded, and transmitted based on current fluctuations, which are then propagated through power lines. In 2023, Guri et al. further presented POWER-SUPPLAY [32], a technique utilizing a computer’s power unit (PSU) to generate sound covertly and transmit it to nearby receivers like smartphones.
We primarily investigated air-gap channels capable of breaching air-gap isolation and presented the channel design, process, analysis, and evaluation. Table 1 enumerates the prevalent existing air-gap communication channels.
The PowerBridge air-gap channel we propose distinguishes itself from previous research in the following aspects:
Robust universality. Enhanced universality is achieved by leveraging the inherent power measurement function of widely adopted smart plugs, eliminating the need for additional hardware implantation and thereby enhancing the versatility of the PowerBridge air-gap channel.

4. Power Line Communication and Smart Plug

Bidirectional communication. The PowerBridge is a bidirectional channel capable of both exudation and infiltration, surpassing the limitations of existing PowerHammer air-gap channels that are restricted to exudation only. Furthermore, we conducted an evaluation of our approach on a laptop and successfully demonstrated the efficacy of this channel.

4.1. Power Line Communication

Power line communication (PLC) pertains to the utilization of power lines and their transmission and distribution networks as a medium for communication technology and system applications [33], which has witnessed an escalating deployment in recent times.
Due to its utilization of existing power grids for communication, it offers a solution without the need for additional wiring in network environments such as hotels and duplex residences that lack wired networks or face routing difficulties (as depicted in Figure 8). Manufacturers of PLC devices report shipping millions of such devices annually with expectations for continued growth in the future [34]; the common topology of the power cat is shown in Figure 9, and the electrical schematic is shown in Figure 10. PLC not only supplements wireless network solutions but also emerges as a formidable competitor; hence, extensive research is being conducted in this field. Images of common electric cats are shown in Figure 11.

4.2. Smart Plug

A smart plug is an Internet-connected device designed to remotely control and automate the use of appliances and devices in homes and businesses, common smart socket usage scenarios, as shown in Figure 12. These small devices are installed on standard power plugs, allowing users to easily control their appliances from anywhere without physical interaction. Smart plugs can also provide energy consumption information, notify users of excessive electricity usage, and offer timer functions that can be programmed according to specific events or conditions.
With the increasing popularity of smart home technology and the proliferation of Internet-connected devices, it is anticipated that the market for smart plugs will experience significant growth in the coming years.
The global market for smart plugs is projected to reach a value of 9.24 billion US dollars by 2030, exhibiting a compound annual growth rate of 26.1% from 2023 to 2030 [35]. Furthermore, it is anticipated that the shipment volume will attain approximately 104 million units by the year 2030 [36]. In the context of smart homes, these plugs can be directly integrated into wall plugs or connected in series between power lines and appliances through standard power plugs, thereby enabling users to conveniently manage electrical equipment remotely at their convenience.
The structure of smart plugs primarily comprises power conversion modules and energy acquisition modules; their electrical structure is shown in Figure 13. The electric energy acquisition module transmits the collected current information to the WiFi communication module for external device transmission [37]. This enables intelligent measuring plugs to monitor real-time data on the current, electricity, voltage, and power consumption of electrical equipment while also offering early warning capabilities for voltage peaks. Many smart plugs provide detailed reports on energy consumption and usage patterns of appliances or devices, which facilitate informed decision-making regarding energy conservation strategies or upgrades.
In this paper, we propose a novel bidirectional communication channel called PowerBridge for air-gapped computers, which combines a controlled smart plug with Guri et al.’s PowerHammer model.

4.3. Computer Power Management

The current computer system encompasses a wide range of devices, including desktops, mobile platforms, workstations, and servers. These devices primarily utilize the ACPI (Advanced Configuration and Power Interface) for efficient power management. Developed collaboratively by Intel, Microsoft, and Toshiba in 1997, the ACPI offers comprehensive power management interfaces for operating system application management. The latest version available is 5.0 [38]. The ACPI serves as a powerful specification that allows an operating system to obtain hardware status information such as the source of power (battery or external supply). Consequently, third-party software programs can also determine whether the computer is currently running on battery or connected to a power source based on the provided power management interface offered by the ACPI. The architecture of the ACPI is illustrated in Figure 14 [39].
In practical circuits, the power adapter serves as the central module of the entire system. The AC–DC adapter is commonly employed to convert AC main power into DC power, enabling direct supply to various electronic devices. To enhance power supply efficiency, it becomes imperative to switch between the low-power mode and the normal mode. Figure 15 illustrates common physical components utilized in this process. Initially, the input conditioning circuit rectifies and filters the AC signal, generating the first AC signal that drives the primary winding of the transformer. The secondary winding then converts this into a second AC signal with a desired amplitude. Finally, through regulation and power transmission circuitry, further rectification and filtering of the AC signal occurs, resulting in the generation of DC output voltage, Vout. Figure 16 depicts an electrical structure typical for a standard power adapter [40].
There are two methods for communication between the air-gapped computer and the smart plug: the exfiltration and infiltration scenarios.
In the exfiltration scenario, a fluctuation signal of computer power consumption is generated using the CPU, which is then captured by the power measurement module of the smart plug and transmitted to a remote receiver for decoding, thereby completing the exfiltration process.
For infiltration scenarios, smart plugs serve as intermediary transfer bridges to transmit commands to air-gapped computers through power lines. The Advanced Configuration and Power Interface (ACPI) provides an interface for detecting the external power supply status, enabling the computer operating system itself to offer tools for accessing this interface, such as the ‘powercfg’ command on Windows systems and the ‘upower’ command on Linux systems. These tools can be utilized to manage power plans, utilize available sleep states, control individual device power statuses, and analyze common energy efficiency and battery life issues within the system. The Windows operating system’s ‘powercfg’ command encompasses various functions including creating, initiating, or pausing power plans. Notably, one of these commands, ‘/batteryreport’, generates a report detailing battery usage (as depicted in Figure 17).
The graph clearly illustrates the logged records of whether the laptop is powered by an external power supply or a battery. These log records enable analysis of the timing when the external power supply is initiated and disconnected, i.e., when the smart plug switch is turned on and off, providing a viable pathway for infiltration.

5. Channel Signal Generation

In this section, we will elucidate the signal generation methodology employed for air-gap channels.

5.1. Exfiltration (Creating Power Line Current Fluctuations through the CPU)

The computer’s electrical hardware modules primarily consist of the CPU, motherboard, GPU, and hard drive. While CPUs and GPUs possess the highest power consumption, not all computers are equipped with discrete graphics cards [41]. Instead, many utilize internal display modules, which allow for leveraging the CPU to generate current fluctuations in order to enhance compatibility across systems since all computers are equipped with CPUs. By employing a simple dead loop within a single-core CPU, nearly maximum power utilization can be achieved; whereas in multi-core CPUs, engaging multiple threads within the dead loop can fully load all cores of the CPU. Henceforth, this principle offers an effortless means to construct signals exhibiting power fluctuations. Figure 18 illustrates the comparison of low and high CPU loads on the total power consumption of several brands of laptops.
Universality: The operating system of a computer grants each process the CPU utilization privilege without requiring separate permission requests, thereby minimizing the detection or termination of malicious code responsible for signal transmission by conventional security software.
To assess and evaluate the risks associated with this air-gap channel, we have developed a simulation program that leverages CPU power fluctuations for signal transmission. The program initially reads the relevant data and converts them into the communication encoding format (2ASK), such as the binary format. Subsequently, it is modulated to align with CPU power consumption levels. A low load condition, indicating reduced power consumption over a duration of T, represents 1; whereas a high load condition, indicating increased power consumption over a duration of T, represents 0. At the receiving end (smart plug), the signal can be decoded using a protocol based on received power consumption signals. Algorithm 1 outlines the fundamental process of transmitting signals based on CPU power fluctuations.
Algorithm 1 CPU Power consumption signal modulation algorithm
  • Input: Number of threads, Payload, payloadSize, Cycle
  • binBuff[]=payload
  • i = 0
  • Do
  •    If (binBuff[i++] == 1)
  •       HighCPUload(Cycle);
  •    else
  •       LowCPUload(Cycle)
  • While (i < payloadSize)

5.2. Infiltration (Control Power On and Off through Smart Plug)

As laptops are capable of detecting the power supply status, the smart plug switch can serve as a signal to transmit data to the ACPI interface of the laptop and subsequently relay it to an air-gapped computer. To facilitate testing and evaluation, this study presents a simulation system incorporating a modified plug that encodes binary data. The plug comprises MCU chips, WiFi modules, and relay modules. The WiFi module facilitates remote network communication, while the MCU chip receives commands and transmits received exfiltration signals. Additionally, it simultaneously controls the opening and closing of relays for powering on/off purposes. The remote control MCU is responsible for transmitting and receiving binary data based on an encoding scheme.

6. Data Encoding and Decoding

In this section, we will delve into the data encoding and decoding techniques employed in PowerBridge communication. It is worth noting that power line communication technology has been extensively researched in both academic and industrial domains, resulting in a plethora of proposed modulation, demodulation, encoding, and decoding schemes [42]. We present an overview of the modulation and encoding schemes utilized in PowerBridge communication while elucidating their distinctive characteristics.

6.1. Communication Modulation

6.1.1. Modulation of Exfiltration Communication

In the event of exfiltration, we can manipulate the CPU load size to influence the amplitude of the current signal or regulate the frequency of current signal fluctuations by controlling load duration and utilizing inter-load time intervals. Amplitude and frequency represent two pivotal parameters in a signal, enabling diverse modulation techniques such as amplitude-shift keying (ASK), frequency-shift keying (FSK), and phase-shift keying (PSK) through their manipulation. Subsequent sections will elaborate on these three modulation methods.
  • ASK is a digital modulation technique that utilizes the amplitude of the carrier wave to transmit information by varying the digital baseband signal. The program can regulate the power line current’s magnitude (amplitude) through different CPU load sizes. In the Binary Amplitude Key (2ASK), binary digits “0” and “1” correspond to two distinct states of carrier amplitude, and analog modulation and keying methods can generate the 2ASK signal. Although this modulation algorithm is relatively straightforward and intuitive, it suffers from low communication rate issues. To enhance transmission rate, multi-amplitude-shift keying (MASK) can be employed, where M represents the controllable number of CPU cores. MASK exhibits two notable characteristics: Firstly, in the same channel code source modulation scheme, each symbol has the capacity to carry log2M bits of information. Consequently, when the channel frequency band is constrained, it enables an increase in the transmission rate of information and enhances frequency band utilization. However, this advantage comes at the expense of amplified signal power and increased implementation complexity. Secondly, for a given information rate, multi-level base methods exhibit lower channel transmission rates compared to binary methods. As a result, the duration of multi-level signal code sources is wider than that of binary methods. Expanding the symbol width augments energy within signal symbols, while simultaneously mitigating the inter-symbol interference arising from channel characteristics [43]. Although multi-level MASK modulation serves as an efficient transmission technique, its susceptibility to noise and fading renders it more suitable for scenarios with minimal channel interference. Figure 19 shows the waveform of computer power consumption; with 0–8 cores gradually reaching full load on an 8-core CPU, it can display 24-bit binary sequence data.
  • FSK is a digital modulation technique that utilizes the frequency of the carrier wave to transmit information by varying the digital baseband signal. It is well-known that the signal frequency can be manipulated by adjusting the time interval between two CPU loads. Hence, in an exfiltration scenario, binary information “0” and “1” correspond to two distinct frequencies f1 and f2 of the carrier signal, respectively. The implementation of 2FSK is relatively straightforward, exhibiting excellent performance in terms of noise and attenuation resistance, making it extensively employed for medium- and low-speed data transmission applications. When employing a multi-base system for modulation, it is referred to as MFSK, which employs multiple carrier frequencies to represent diverse methods of digital information modulation. Figure 20 illustrates both time-domain signals and the corresponding spectra of a synthesized 4-frequency FSK achieved through fluctuations in CPU power consumption at frequencies of 7 Hz, 13 Hz, 17 Hz, and 23 Hz.
  • PSK is a digital modulation scheme that utilizes the phase of the carrier signal to encode input information. Phase-shift keying can be categorized into two types: absolute phase shift and relative phase shift. Absolute phase-shifting refers to phase modulation based on the unmodulated carrier’s initial phase. Taking binary phase modulation as an example, when the symbol is set to “0”, the modulated carrier remains in phase with the unmodulated carrier; whereas, when the symbol is set to “1”, the modulated carrier undergoes a 180° inversion from its original state. The waveform representing the difference in carrier phases between “0” and “1” exhibits a 180° change, and for 2PSK, it follows a modulation pattern of “01001001”, as illustrated in Figure 21.

6.1.2. Modulation of Infiltration Communication

In the infiltration scenario, it is feasible to exert control over the power state of the smart plug and transmit signals to the laptop. In order to ensure computer and power adapter safety, caution should be exercised regarding the frequency of power switching, as excessively high frequencies may lead to damage to electrical appliances. Consequently, conventional ASK, FSK, and PSK modulation techniques are unsuitable for implementation in this particular scenario. To address this concern, pulse interval modulation (PIM) can be employed for communication purposes by representing data through distinct time durations between two consecutive pulses [44]. A reference time interval denoted as T is defined within the standard document; it represents the temporal width between adjacent pulses with a duration of T. The intelligent plug generates a pulse each time it switches on or off, thereby enabling the modulation of signals based on the temporal intervals between these pulses. Figure 22 illustrates the waveform, while Table 2 presents an encoding table associated with PIM technique usage. The receiving software installed on the laptop captures and analyzes these temporal intervals between successive pulses before querying against the encoding table for decoding purposes.

6.2. Data Packets

We transmit data in the form of 56-bit frames, which consist of a frame header, payload, and frame tail. The frame header includes an 8-bit preamble, while the payload contains 40 bits. Finally, the frame tail comprises an 8-bit checksum as illustrated in Figure 23.
The frame header, transmitted at the beginning of each packet and comprising eight alternating symbols (“10101010”), facilitates the receiver in determining the channel signal’s starting position. Moreover, it enables synchronization with transmission initiation and the calibration of other parameters, such as the current frame number and device power. The data frame represents the actual binary data to be transmitted for each data frame, with a payload size chosen as 40 digits. To detect and rectify transmission errors, an 8-bit RS error correction code is inserted at the end of the frame. The receiving end calculates this RS error correction code for the received payload, enabling the correction of any errors in data bits during transmission. An 8-bit RS error correction code can correct up to 4 bits of data at any given position [45].

6.3. Signal Reception and Data Decoding

PowerBridge utilizes power lines as a communication medium, resulting in half-duplex communication due to the inability of simultaneous exfiltration and infiltration communication.
In the exfiltration scenario, the software embedded in the air-gapped computer captures power consumption fluctuations from hardware devices to transmit signals through series-connected smart plugs on the power line. Subsequently, these fluctuating signals are forwarded by smart plugs to the receiver and decoded using an algorithm. This approach bears a resemblance to Guri’s PowerHammer technique, which will not be reiterated within this article.
In the infiltration scenario, the current signal is transmitted by remotely controlling the switch of the smart socket to the open and closed positions. The laptop detects the power supply state through the ACPI interface, switches to battery power when disconnected from the external power supply, and logs this information. The computer software utilizes the kernel.dll dynamic library’s API interface GetPowerStatus to detect and record ACoff and ACon as external power status indicators, enabling the determination of signal timing for data decoding. Ultimately, communication content can be decoded based on the agreed-upon communication protocol. Algorithm 2 describes the process of PIM-based signal decoding.
When utilizing the powercfg command to access the system power usage log, it is observed that the logging time interval is significant, resulting in a failure to record power status changes occurring within less than 3 s. This limitation can lead to a reduced data reception rate at the receiving end. Through experimentation, we have discovered that the GetPowerStatus API provided by the Windows operating system serves as an interface function exported from the dynamic library ‘kernel.dll’. This API enables querying of the computer power supply status and related information. Consequently, employing this API for rapid polling effectively resolves the issue of extensive logging time intervals and enhances communication speed.
Algorithm 2 PIM signal demodulation algorithm
  • Input: PowerPulses, EncodeTable
  • Output: Transferred data
  • While (i < PowerPulses)
  •    Time1 = GetPulseTime(i)
  •    i = i + 1
  •    Time2 = GetPulseTime(i)
  •    Interval = Time2 − Time1
  •    BinCode = SearchEncodeTable(Interval)
  • Output ← decodedData

7. Evaluation and Analysis

In this section, we present the evaluation results based on our experiments and analysis, including the maximum bit rates for both communication directions of exfiltration and infiltration; the transmission mode is shown in Table 3. For the exfiltration scenario, we conducted tests using the laptop’s CPU to induce power fluctuations for data exfiltration. We utilized the emitted current signal from the laptop to covertly transmit binary encoded data. In the case of the infiltration scenario, we simulated a smart plug to control power states (on/off) in order to achieve the data infiltration scheme. Additionally, we analyzed how smart plugs can be employed for signaling laptops. To establish two-way communication with an air-gapped computer in exfiltration and infiltration scenarios, we implemented the setup depicted in Figure 24.

7.1. Exfiltration

The technology and solutions of power line communication have been extensively applied in commercial and household scenarios, with their maximum bit rate and distance primarily determined by the power and frequency band of the PLC transmitter. Typically, these applications are limited to within the household range, where longer communication distances generally result in lower communication rates. Notably, Guri et al.’s PowerHammer study successfully demonstrated that computers themselves can serve as hardware for signal transmission without requiring additional equipment.
In this section, we exclusively examine the distinctive characteristics of the plug as a receiver. For more comprehensive insights into visible power line communication and IoT security, we recommend interested readers refer to the relevant literature [46]. To conduct testing and an evaluation, we employed the transmitter described in Section VI for generating power consumption fluctuation signals and performed exfiltration tests on multiple laptop brands.

7.1.1. Communication Rate

In the case of exfiltration, the primary factor that restricts the communication rate is the direct correlation between the response time ∆T from the CPU operation and fluctuations in power consumption. Experimental results obtained from a Gigabyte AERO 15 laptop demonstrated that the minimum ∆T duration was 33 milliseconds. This limitation may arise due to voltage stabilization effects caused by capacitors present within both the computer itself and the power adapter. It is well-known that power adapters employ high-capacity capacitors to filter out power fluctuations and jitter, thereby stabilizing voltage through peak shaving and valley filling functions [47]. However, since capacitors have the ability to filter out high-frequency waveforms, they impose restrictions on maximum communication frequency and directly impact communication speed. Consequently, it becomes evident that the shortest time interval for symbol signals to avoid overlap determines both the highest effective signal frequency f = 1/T as well as the maximum communication rate for exfiltration.
The maximum bit rates of exfiltration in the experimental system of this article using two different modulations are recorded in Table 4. Signal transmission in the experimental system is conducted through five mainstream brands of laptops, while reception is achieved using our designed plug. The signal is modulated with 2ASK, and the measured exfiltration rate ranges from 27 to 33 bits/s. Compared to common wired or wireless networks, this communication rate is relatively low, indicating that this channel can only accommodate a limited amount of content. The current signal is received by the smart plug, as shown in Figure 25.

7.1.2. Universality

As data modulation is achieved by manipulating CPU power consumption, variations in CPU power consumption levels are reflected in the recorded data obtained from the smart plug power measurement module. When malicious programs excessively occupy and heavily load the CPU or when users meticulously monitor CPU usage through the operating system task manager, abnormal patterns of CPU calls may be observed, potentially exposing air-gap channels. However, detecting such exfiltration of air-gap channels becomes challenging when computers are locked or remain idle for extended periods. Given that background programs only intermittently utilize 100% of the CPU’s capacity, ordinary computer users face difficulties in detection, while experiencing significant potential harm.

7.2. Infiltration

7.2.1. Bit Rate

Our study utilizes the ACPI interface of a computer to receive switch signals from smart plugs. In laptop power adapters, larger capacitors are commonly employed to effectively filter voltage fluctuations and interference, ensuring the stable operation of the computer. Consequently, the response of a computer to power supply on/off events is influenced by the charging and discharging speed of these capacitors. To determine the minimum response time for laptops during power outages, experimental investigations are conducted. By obtaining this shortest response time, we can calculate the maximum achievable communication rate. The corresponding power outage response times and fastest communication speeds for laptops from different brands are presented in Table 5.

7.2.2. Universality

Our study employs the activation and deactivation of intelligent plugs to facilitate signal transmission, resulting in the continuous power cycling of laptop adapters. This research investigates the utilization of pulse interval modulation (PIM) as a modulation technique for communication, wherein data are represented by defining varying time durations between pulse falling edges. Table 6 shows a comparison of the communication capabilities of the disclosed air-gapped covert channels. By employing longer modulation intervals that are challenging for users to detect, this covert infiltration method exhibits significant concealment capabilities and potential risks.

8. Discussion

In this section, we will discuss two practical strategies for PowerBridge. Countermeasures can be roughly divided into procedural and technical measures.

8.1. Exfiltration Countermeasures

8.1.1. Detection

Security software is utilized to identify running programs on a computer and uncover the process of establishing air-gap channels. In this approach, security solutions such as antivirus (AV) strive to detect malicious operations by recording and monitoring the logs of software processes interacting with the CPU. When it comes to power line air-gap channels, abnormal workloads are imposed on the CPU, enabling security software to detect them through this characteristic. However, due to the diverse types of software employed in computers and considerable variability in user behavior, both software and user actions can result in unexpected fluctuations in the CPU workload. Consequently, this detection method may yield a significant number of false positives or false negatives.

8.1.2. Signal Interference

The method of signal interference is commonly employed to obstruct electromagnetic [48] and acoustic [49] air-gap channels. Deceptive interference is conducted on the receiving end by generating random signals resembling those of the air-gap channel, or high-power signals are generated to suppress interference on the air-gap channel signal. Conventional WiFi jammers can impede WiFi signal communication within distances of several hundred meters [50]. For the power line air-gap channel discussed in this article, workloads with comparable power to that of the air-gapped computer can be connected in parallel to the power line to generate false or strong signals for interference purposes. However, workloads are energy-intensive devices, which may result in increased user power consumption and could prove impractical in certain environments where the power system cannot support them.

8.2. Infiltration Countermeasures

The most straightforward approach for infiltration scenarios involves prohibiting the connection of computers with air-gap isolation to devices equipped with IoT capabilities, such as smart plugs. This method yields favorable outcomes for computer equipment situated in fixed locations. However, there exists a potential risk of infiltration when critical equipment needs to be introduced into unfamiliar environments (e.g., attending meetings at unfamiliar venues or staying in hotels) and necessitates power supply connectivity. Consequently, users can employ security software to conduct audits on their laptops’ power logs, generate alerts upon detecting suspected attacks, and promptly disconnect hazardous power sources.

9. Conclusions

Electricity serves as an indispensable energy source for contemporary electronic devices, necessitating the utilization of power lines for both power supply and charging purposes, thereby establishing air-gap channels. In this article, we demonstrate the exploitation of plugs to facilitate data exfiltration and infiltration through power lines.
In the exfiltration scenario, the software regulates the CPU workload, constructs the power consumption fluctuations of the device, and generates current fluctuation signals across the air gap. Sensitive data on a computer with air-gap isolation are modulated, encoded, and transmitted using binary-encoded signals from power lines. The remote controller of the plug can receive current signals and decode binary information.
The signal in the infiltration scenario is generated by the remote controller through the switch (off or on) of the smart plug.
The ACPI interface on the computer receives the switch signal from the plug, and by continuously polling the power API interface of the operating system, software on the computer can perceive it in real time. We have described a threat model and analyzed a usage scenario for this power line air-gap channel and have designed a modulation protocol suitable for communication in this scenario.
We conducted a software prototype simulation and performed evaluations on various laptop models, while also discussing countermeasures for the prevention and defense of PowerBridge air-gap channels.
Our evaluation demonstrates that smart plugs enable unidirectional simplex communication with air-gapped computers. Our findings indicate that data can be exfiltrated from the network through power lines at an approximate bit rate of 30 bits per second and transmitted to laptops isolated by air gaps at an approximate bit rate of 1 bit per second.

Author Contributions

Formal analysis, H.S. and L.Q.; Writing—review and editing, Y.L. and Z.L.; Supervision, Y.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Nagendran, K.; Balaji, S.; Raj, B.A.; Chanthrika, P.; Amirthaa, R.G. Web Application Firewall Evasion Techniques. In Proceedings of the 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 March 2020; pp. 194–199. [Google Scholar]
  2. Michener, D.R.J. Beating the Air-Gap: How Attackers Can Gain Access to Supposedly Isolated Systems. 2018. Available online: https://energycentral.com/c/iu/beating-air-gap-how-attackers-can-gain-access-supposedly-isolated-systems (accessed on 25 June 2024).
  3. Elsadig, M.A.; Fadlalla, Y.A. Network Protocol Covert Channels: Countermeasures Techniques. In Proceedings of the 2017 9th IEEE-GCC Conference and Exhibition (GCCCE), Manama, Bahrain, 8–11 May 2017; pp. 1–9. [Google Scholar]
  4. Shen, C.; Liu, T.; Huang, J.; Tan, R. When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient. In Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 24–27 May 2021; pp. 1304–1317. [Google Scholar]
  5. Kim, T.; Shin, Y. ThermalBleed: A Practical Thermal Side-Channel Attack. IEEE Access 2022, 10, 25718–25731. [Google Scholar] [CrossRef]
  6. Sherry, R.; Bayne, E.; McLuskie, D. Near-Ultrasonic Covert Channels Using Software-Defined Radio Techniques. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media; Springer Proceedings in Complexity; Springer: Singapore, 2023. [Google Scholar]
  7. Guri, M.; Zadov, B.; Bykhovsky, D.; Elovici, Y. PowerHammer: Exfiltrating data from air-gapped computers through power lines. IEEE Trans. Inf. Forensics Secur. 2019, 15, 1879–1890. [Google Scholar] [CrossRef]
  8. Cronin, P.; Gouert, C.; Mouris, D.; Tsoutsos, N.G.; Yang, C. Covert data exfiltration using light and power channels. In Proceedings of the 2019 IEEE 37th International Conference on Computer Design (ICCD), Abu Dhabi, United Arab Emirates, 17–20 November 2019; pp. 301–304. [Google Scholar]
  9. Davis, B.D.; Mason, J.C.; Anwar, M. Vulnerability studies and security postures of IoT devices: A smart home case study. IEEE Internet Things J. 2020, 7, 10102–10110. [Google Scholar] [CrossRef]
  10. Zhou, Z.; Zhang, W.; Li, S.; Yu, N. Potential Risk of IoT Device Supporting IR Remote Control. Comput. Netw. 2019, 148, 307–317. [Google Scholar] [CrossRef]
  11. Ling, Z.; Luo, J.; Xu, Y.; Gao, C.; Wu, K.; Fu, X. Security vulnerabilities of internet of things: A case study of the smart plug system. IEEE Internet Things J. 2017, 4, 1899–1909. [Google Scholar] [CrossRef]
  12. Gnad, D.R.; Krautter, J.; Tahoori, M.B. Leaky noise: New side-channel attack vectors in mixed-signal IoT devices. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019, 2019, 305–339. [Google Scholar] [CrossRef]
  13. New Security Signals Study Shows Firmware Attacks on the Rise. 2021. Available online: https://www.microsoft.com/en-us/security/blog/2021/03/30/new-security-signals-study-shows-firmware-attacks-on-the-rise-heres-how-microsoft-is-working-to-help-eliminate-this-entire-class-of-threats/ (accessed on 3 May 2024).
  14. McAfee: Discovers New IoT Vulnerability in Wemo Insight Smart Plugs. 2019. Available online: https://www.mcafee.com/blogs/internet-security/wemo-vulnerability (accessed on 3 May 2024).
  15. Iqbal, A.; Olegård, J.; Ghimire, R.; Jamshir, S.; Shalaginov, A. Smart Home Forensics: An Exploratory Study on Smart Plug Forensic Analysis. In Proceedings of the 2020 IEEE International Conference on Big Data (Big Data), Atlanta, GA, USA, 10–13 December 2020; pp. 2283–2290. [Google Scholar]
  16. Khosravi, M.; Ladani, B.T. Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection. IEEE Access 2020, 8, 162642–162656. [Google Scholar] [CrossRef]
  17. Kenney, M. Cyber-terrorism in a post-stuxnet world. Orbis 2015, 59, 111–128. [Google Scholar] [CrossRef]
  18. Rhysida Ransomware Leaks documents Stolen from Chilean Army. 2023. Available online: https://www.bleepingcomputer.com/news/security/rhysida-ransomware-leaks-documents-stolen-from-chilean-army/ (accessed on 3 May 2024).
  19. PCI Express. 2002. Available online: https://www.intel.com/content/dam/doc/white-paper/pci-express-architecture-power-management-rev-1-1-paper.pdf (accessed on 3 May 2024).
  20. Powercfg Command-Line Options. 2021. Available online: https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/powercfg-command-line-options (accessed on 3 May 2024).
  21. Singh, S.; Sharma, P.K.; Moon, S.Y.; Moon, D.; Park, J.H. A comprehensive study on APT attacks and countermeasures for future networks and communications: Challenges and solutions. J. Supercomput. 2019, 75, 4543–4574. [Google Scholar] [CrossRef]
  22. Muralidhara, S.; Hegde, N.; Rekha, P.M. An internet of things-based smart energy meter for monitoring device-level consumption of energy. Comput. Electr. Eng. 2020, 87, 106772. [Google Scholar] [CrossRef]
  23. Zhan, Z.; Zhang, Z.; Koutsoukos, X. BitJabber: The World’s Fastest Electromagnetic Covert Channel. In Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), San Jose, CA, USA, 7–11 December 2020; pp. 35–45. [Google Scholar]
  24. Guri, M. AIR-FI: Leaking Data from Air-Gapped Computers Using Wi-Fi Frequencies. IEEE Trans. Dependable Secur. Comput. 2022, 20, 2547–2564. [Google Scholar] [CrossRef]
  25. Guri, M. RAMBO: Leaking Secrets from Air-Gap Computers bySpelling Covert Radio Signals from Computer RAM. In Secure IT Systems. NordSec 2023. Lecture Notes in Computer Science; Fritsch, L., Hassan, I., Paintsil, E., Eds.; Springer: Cham, Switzerland, 2024; Volume 14324. [Google Scholar]
  26. Guri, M. Exfiltrating Data from Air-Gapped Computers via ViBrAtIoNs. Future Gener. Comput. Syst. 2021, 122, 69–81. [Google Scholar] [CrossRef]
  27. Giechaskiel, I.; Zhang, Y.; Rasmussen, K.B. A Framework for Evaluating Security in the Presence of Signal Injection Attacks. In Computer Security—ESORICS 2019. ESORICS 2019. Lecture Notes in Computer Science; Sako, K., Schneider, S., Ryan, P., Eds.; Springer: Cham, Switzerland, 2019; Volume 11735. [Google Scholar]
  28. de Gortari Briseno, J.; Singh, A.D.; Srivastava, M. InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks. ACM Trans. Priv. Secur. 2022, 25, 1–26. [Google Scholar] [CrossRef]
  29. Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C. LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems. In Proceedings of the 37th Annual Computer Security Applications Conference, Virtual, 6–10 December 2021. [Google Scholar]
  30. Guri, M. ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDs. In Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 27–29 July 2022; pp. 163–170. [Google Scholar]
  31. Schlauder, B.; Tremblay, C.; Johnson, D. CD-Blink: An External Disk Drive Based Covert Channel. In Proceedings of the 10th International Conference on Control, Dynamic Systems, and Robotics (CDSR 2023), Ottawa, ON, Canada, 1–3 June 2023. [Google Scholar]
  32. Guri, M. POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers. IEEE Trans. Dependable Secur. Comput. 2023, 20, 313–330. [Google Scholar] [CrossRef]
  33. Dileep, G. A survey on smart grid technologies and applications. Renew. Energy 2020, 146, 2589–2625. [Google Scholar] [CrossRef]
  34. Huge demands for Power Line Carrier Communication Chip Market 2022-Growing Rapidly with Latest Trends and Future scope. 2021. Available online: Https://www.openpr.com/news/2751815/huge-demands-for-power-line-carrier-communication-chip-market (accessed on 3 May 2024).
  35. Smart Plug Market. 2023. Available online: https://www.globenewswire.com/news-release/2023/02/16/2610148/0/en/Smart-Plug-Market-Size-Worth-USD-9-24-Billion-by-2030-Growing-at-a-CAGR-of-26-1-during-the-forecast-period-2023-2030-Data-By-Contrive-Datum-Insights.html (accessed on 3 May 2024).
  36. Smart Plug Market. 2022. Available online: https://www.grandviewresearch.com/industry-analysis/smart-plug-market (accessed on 3 May 2024).
  37. Rehman, A.U.; Syed, A.R.; Khan, I.U.; Mustafa, A.A.; Anwer, M.B.; Ali, U.A. IoT-enabled smart plug. Wirel. Pers. Commun. 2021, 116, 1151–1169. [Google Scholar] [CrossRef]
  38. Duflot, L.; Levillain, O.; Morin, B. ACPI: Design Principles and Concerns. In Trusted Computing. Trust 2009. Lecture Notes in Computer Science; Chen, L., Mitchell, C.J., Martin, A., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; Volume 5471. [Google Scholar]
  39. ACPI System Management Bus Interface Specification. 2021. Available online: https://uefi.org/htmlspecs/ACPI_Spec_6_4_html/13_ACPI_System_Mgmt_Bus_Interface_Spec/ACPI_Sys_Mgmt_Bus_Interface_Specification.html (accessed on 3 May 2024).
  40. Patent Information. 2020. Available online: https://www.163.com/dy/article/FJGROJ230511RIVP.html (accessed on 3 May 2024).
  41. Sun, Y.; Agostini, N.B.; Dong, S.; Kaeli, D. Summarizing CPU and GPU Design Trends with Product Data. arXiv 2019, arXiv:1911.11313. [Google Scholar]
  42. Zhang, H.; Yang, L.-L.; Hanzo, L. LDPC-Coded Index-Modulation Aided OFDM for In-Vehicle Power Line Communications. In Proceedings of the 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), Nanjing, China, 15–18 May 2016; pp. 1–5. [Google Scholar]
  43. Modulation Mode. 2022. Available online: https://baike.baidu.com/item/%E8%B0%83%E5%88%B6%E6%96%B9%E5%BC%8F/8971326 (accessed on 3 May 2024).
  44. Tao, M.; Guan, J.; Peng, T.; Li, S.; Yu, S.; Song, J.; Song, Z.; Gao, L.; Gao, F. Simultaneous realization of laser ranging and communication based on dual-pulse interval modulation. IEEE Trans. Instrum. Meas. 2021, 70, 1–10. [Google Scholar] [CrossRef]
  45. McEliece, R.J.; Sarwate, D.V. On sharing secrets and Reed-Solomon codes. Commun. ACM 1981, 24, 583–584. [Google Scholar] [CrossRef]
  46. Hodges, D. Cyber-enabled burglary of smart homes. Comput. Secur. 2021, 110, 102418. [Google Scholar] [CrossRef]
  47. Rao, A.; McIntyre, W.; Moon, U.K.; Temes, G.C. Noise-shaping techniques applied to switched-capacitor voltage regulators. IEEE J. Solid-State Circuits 2005, 40, 422–429. [Google Scholar] [CrossRef]
  48. Bhushan, S.; Yaduvanshi, R.S. Cylindrical Dielectric Resonator Antenna for WiFi Jammer for blocking WiFi calls at prison. In Proceedings of the 2022 IEEE 6th Conference on Information and Communication Technology (CICT), Gwalior, India, 18–20 November 2022; pp. 1–4. [Google Scholar]
  49. Wang, X.H.; Li, S.B.; Jiang, Y.T.; Singh, A.K.; Ma, B.Y.; Huang, L.T.; Yang, M.; Guo, F. Inaudible sound covert channel with anti-jamming capability: Attacks vs. countermeasure. J. Electron. Sci. Technol. 2022, 20, 100181. [Google Scholar] [CrossRef]
  50. Schloeder-EMV: Magnetic Field Generator and Analyzer. 2018. Available online: https://www.schloeder-emc.com/emc-products/emc-test-and-measurement-system/emc-generators-measurement-systems/magnetic-field-generator-and-analyzer-1.html (accessed on 3 May 2024).
Figure 1. Air-gapped isolation network.
Figure 1. Air-gapped isolation network.
Applsci 14 06321 g001
Figure 2. Scenes of data infiltrating and exfiltrating through smart plugs.
Figure 2. Scenes of data infiltrating and exfiltrating through smart plugs.
Applsci 14 06321 g002
Figure 3. Schematic diagram of the air-gap channel for data exfiltration, where malware on the air-gap workstation modulates binary information onto power line transfer device power consumption and is intercepted by a nearby smart plug.
Figure 3. Schematic diagram of the air-gap channel for data exfiltration, where malware on the air-gap workstation modulates binary information onto power line transfer device power consumption and is intercepted by a nearby smart plug.
Applsci 14 06321 g003
Figure 4. Schematic diagram of the air-gap channel for data infiltration. Attackers use a smart plug to transmit data to a laptop, which is then received by software on the laptop.
Figure 4. Schematic diagram of the air-gap channel for data infiltration. Attackers use a smart plug to transmit data to a laptop, which is then received by software on the laptop.
Applsci 14 06321 g004
Figure 5. Places with hidden risks. (a) Plug in conference room; (b) plug in hotel.
Figure 5. Places with hidden risks. (a) Plug in conference room; (b) plug in hotel.
Applsci 14 06321 g005
Figure 6. Physical image of smart meter.
Figure 6. Physical image of smart meter.
Applsci 14 06321 g006
Figure 7. Schematic diagram of remote meter reading.
Figure 7. Schematic diagram of remote meter reading.
Applsci 14 06321 g007
Figure 8. Power line WiFi cross-layer coverage.
Figure 8. Power line WiFi cross-layer coverage.
Applsci 14 06321 g008
Figure 9. Power line WiFi schematic diagram.
Figure 9. Power line WiFi schematic diagram.
Applsci 14 06321 g009
Figure 10. Power line communication principle diagram.
Figure 10. Power line communication principle diagram.
Applsci 14 06321 g010
Figure 11. Images of common electric cats.
Figure 11. Images of common electric cats.
Applsci 14 06321 g011
Figure 12. Intelligent plug usage scenarios.
Figure 12. Intelligent plug usage scenarios.
Applsci 14 06321 g012
Figure 13. Smart plug electrical structure diagram.
Figure 13. Smart plug electrical structure diagram.
Applsci 14 06321 g013
Figure 14. The ACPI is the power management architecture.
Figure 14. The ACPI is the power management architecture.
Applsci 14 06321 g014
Figure 15. Physical picture of common power adapters.
Figure 15. Physical picture of common power adapters.
Applsci 14 06321 g015
Figure 16. AC–DC power adapter.
Figure 16. AC–DC power adapter.
Applsci 14 06321 g016
Figure 17. Laptop power usage log recording.
Figure 17. Laptop power usage log recording.
Applsci 14 06321 g017
Figure 18. Comparison chart of power consumption among 5 popular laptop brands.
Figure 18. Comparison chart of power consumption among 5 popular laptop brands.
Applsci 14 06321 g018
Figure 19. A waveform modulated by 8-amplitude ASK.
Figure 19. A waveform modulated by 8-amplitude ASK.
Applsci 14 06321 g019
Figure 20. Time-domain and frequency spectrum of FSK signal modulated by four frequencies. (a) 4FSK time-domain signal; (b) 4FSK signal spectrum.
Figure 20. Time-domain and frequency spectrum of FSK signal modulated by four frequencies. (a) 4FSK time-domain signal; (b) 4FSK signal spectrum.
Applsci 14 06321 g020
Figure 21. Waveform during the modulation load of 2PSK. (a) PSK signal modulation; (b) PSK time-domain signal.
Figure 21. Waveform during the modulation load of 2PSK. (a) PSK signal modulation; (b) PSK time-domain signal.
Applsci 14 06321 g021
Figure 22. Pulse interval modulation.
Figure 22. Pulse interval modulation.
Applsci 14 06321 g022
Figure 23. Packet frame structure.
Figure 23. Packet frame structure.
Applsci 14 06321 g023
Figure 24. The smart plug is designed for this work.
Figure 24. The smart plug is designed for this work.
Applsci 14 06321 g024
Figure 25. The current signal received by the smart plug.
Figure 25. The current signal received by the smart plug.
Applsci 14 06321 g025
Table 1. Common air-gap channels.
Table 1. Common air-gap channels.
Air-Gap ChannelsCommunication MediumSenderReceiverMethod Name
ElectromagneticElectromagneticMemory,
hard disk
Smartphone, SDRBitJabber,
AIR-FI,
RAMBO
SoundUltrasound,
noise,
vibration
Loudspeaker,
Fan,
Power adapter
Mobile phone accelerometer, microphone,
gyroscope
AiR-ViBeR, InkFiltration
OpticalLaser,
Visible light, infrared light
Laser,
Hard disk lamp,
CD lamp,
Network card light,
Camera infrared light
CameraLaserShark, ETHERLED, CD-Blink
ThermalRadiation of heatair conditionerInfrared sensorHVACKer
Power sectorPower linePower adapterCurrent transformer,
smartphone
PowerHammer, POWER-SUPPLaY
Table 2. Encoding table.
Table 2. Encoding table.
Interval (s)12345678
bits000001010011100101110111
Table 3. Transmission mode of PowerBridge.
Table 3. Transmission mode of PowerBridge.
Transmission ModeSender
Unit
Receiver
Unit
Content of Communication
Exfiltration (leaking data from an air-gapped computer)Power adapter for your computerSmart plug power consumption measurement moduleSmall amounts of data
(sensitive files, passwords, etc.)
Infiltration (sending data to the air-gapped computer)Smart plug switch moduleACPI interface for the computerControl parameter
Table 4. Exfiltration rate test.
Table 4. Exfiltration rate test.
Laptop BrandsMinimum Symbol
Interval Time (ms)
Maximum Bit Rate
(2ASK)
GIGABYTE AERO 153333.30 bits/s
Lenovo X13132.26 bits/s
Dell Precision55703727.03 bits/s
HP Spectre X3603429.41 bits/s
Asus Pro Art Q173132.26 bits/s
Table 5. Infiltration speed test.
Table 5. Infiltration speed test.
Laptop BrandsThe Minimum Time Interval for the Power Adapter to Be Disconnected (s)Maximum Bit Rate
(2ASK)
GIGABYTE AERO 150.85 s1.18 bits/s
Lenovo X10.96 s1.04 bits/s
Dell Precision55700.81 s1.24 bits/s
HP Spectre X3600.78 s1.29 bits/s
Asus Pro Art Q170.86 s1.16 bits/s
Table 6. Comparison of communication capabilities of air gap channels.
Table 6. Comparison of communication capabilities of air gap channels.
Method NameAir-Gap ChannelsCommunication
Capability
Infiltration
Bit Rate (bit/s)
Exfiltration
Bit Rate (bit/s)
BitJabberElectromagneticUnidirectional\300,000
AIR-FI\16
RAMBO\1000
AiR-ViBeRSoundUnidirectional\0.5
InkFiltration\0.5
ETHERLEDOpticalUnidirectional\100
CD-Blink\1
HVACKerThermalBidirectional0.0110.011
PowerHammerPower sectorUnidirectional\1000
POWER-SUPPLaY\60
PowerBridgeBidirectional1.233
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liang, Y.; Shan, H.; Luo, Z.; Qi, L.; Xie, Y. PowerBridge: Covert Air-Gap Exfiltration/Infiltration via Smart Plug. Appl. Sci. 2024, 14, 6321. https://doi.org/10.3390/app14146321

AMA Style

Liang Y, Shan H, Luo Z, Qi L, Xie Y. PowerBridge: Covert Air-Gap Exfiltration/Infiltration via Smart Plug. Applied Sciences. 2024; 14(14):6321. https://doi.org/10.3390/app14146321

Chicago/Turabian Style

Liang, Yongyu, Hong Shan, Zelin Luo, Lanlan Qi, and Yi Xie. 2024. "PowerBridge: Covert Air-Gap Exfiltration/Infiltration via Smart Plug" Applied Sciences 14, no. 14: 6321. https://doi.org/10.3390/app14146321

APA Style

Liang, Y., Shan, H., Luo, Z., Qi, L., & Xie, Y. (2024). PowerBridge: Covert Air-Gap Exfiltration/Infiltration via Smart Plug. Applied Sciences, 14(14), 6321. https://doi.org/10.3390/app14146321

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop