Grand Idea Studio

An Overview of Hardware-Based Covert Channels

 

Covert channels are methods of surreptitious data transfer used to communicate with or exfiltrate information from a compromised computer system. They can exist within any layer of the system, including hardware, application software, operating system, or network stack. Typically, covert channels are employed on critical, protected, and/or air-gapped assets that an attacker may not be able to access by conventional means.

This presentation provides an overview of hardware-based covert channels and demonstrates a few techniques that can be easily implemented with off-the-shelf electronics.

Originally presented at Roadsec @ Home #7, June 10, 2020.

Press

Malicious Life

'L0pht', Part 2 - The End

Malicious Life

The Story of 'L0pht', Part 1

The Makers and Shakers Podcast

Joe Grand