• About Us
  • Contact Us
  • Cookie policy (EU)
  • Home
  • Privacy Policy
  • Video
  • Write for us
Today Headline
  • HOME
  • NEWS
    • POLITICS
    • News for today
    • Borisov news
  • FINANCE
    • Business
    • Insurance
  • Video
  • TECHNOLOGY
  • ENTERPRISE
  • LIFESTYLE
    • TRAVEL
    • HEALTH
    • ENTERTAINMENT
  • AUTOMOTIVE
  • SPORTS
  • Travel and Tourism
  • HOME
  • NEWS
    • POLITICS
    • News for today
    • Borisov news
  • FINANCE
    • Business
    • Insurance
  • Video
  • TECHNOLOGY
  • ENTERPRISE
  • LIFESTYLE
    • TRAVEL
    • HEALTH
    • ENTERTAINMENT
  • AUTOMOTIVE
  • SPORTS
  • Travel and Tourism
No Result
View All Result
TodayHeadline
No Result
View All Result

Radio waves for the detection of hardware tampering

June 22, 2022
in Technology
0
0
SHARES
4
VIEWS
Share on FacebookShare on Twitter


Radio waves for the detection of hardware tampering

The radio signal is as unique as a fingerprint. Credit: Michael Schwettmann

As far as data security is concerned, there is an even greater danger than remote cyberattacks: namely tampering with hardware that can be used to read out information—such as credit card data from a card reader. Researchers in Bochum have developed a new method to detect such manipulations. They monitor the systems with radio waves that react to the slightest changes in the ambient conditions. Unlike conventional methods, they can thus protect entire systems, not just individual components—and they can do it at a lower cost. The RUB’s science magazine Rubin features a report by the team from Ruhr-Universität Bochum (RUB), the Max Planck Institute for Security and Privacy and the IT company PHYSEC.

Paul Staat and Johannes Tobisch presented their findings at the IEEE Symposium on Security and Privacy, which took place in the U.S. from 23 to 25 May 2022. Both researchers are doing their Ph.D.s at RUB and conducting research at the Max Planck Institute for Security and Privacy in Bochum in Professor Christof Paar’s team. For their research, they are cooperating with Dr. Christian Zenger from the RUB spin-off company PHYSEC.

Protection through radio waves

Data is ultimately nothing more than electrical currents that travel between different computer components via conductive paths. A tiny metallic object, located in the right place on the hardware, can be enough to tap into the information streams. To date, only individual components of systems, such as a crucial memory element or a processor, can be protected from such manipulations. “Typically, this is done with a type of foil with thin wires in which the hardware component is wrapped,” explains Paul Staat. “If the foil is damaged, an alarm is triggered.”

The radio wave technology from Bochum, however, can be used to monitor an entire system. To this end, the researchers install two antennas in the system: a transmitter and a receiver. The transmitter sends out a special radio signal that spreads everywhere in the system and is reflected by the walls and computer components. All these reflections cause a signal to reach the receiver that is as characteristic of the system as a fingerprint.

Technology reacts to the slightest changes

Tiny changes to the system are enough to have a noticeable effect on the fingerprint, as the team demonstrated in experiments. The IT experts equipped a conventional computer with radio antennas and punctured its housing with holes at regular intervals. Through these holes, the researchers let a fine metal needle penetrate the inside of the system and checked whether they notice the change in the radio signal. In the process, they varied the thickness of the needle, the position and the depth of penetration.

With the computer running, they reliably detected the penetration of a needle 0.3 millimeters thick with their system from a penetration depth of one centimeter. The system still detected a needle that was only 0.1 millimeters thick—about as thick as a hair—but not in all positions. “The closer the needle is to the receiving antenna, the easier it is to detect,” explains Staat. “Therefore, in practical applications, it makes sense to think carefully about where you place the antennas,” adds Tobisch. “They should be as close as possible to the components that require a high degree of protection.”

Basically, the technology is suitable for both high-security applications and everyday problem. The IT company PHYSEC already uses it to prevent unauthorized manipulation of critical infrastructure components.


New countermeasure against unwanted wireless surveillance


More information:
Anti-tamper radio: System-level tamper detection for computing systems, IEEE Symposium on Security and Privacy, San Francisco, USA, 2022. Conference Proceedings, DOI: 10.1109/SP46214.2022.00067. www.computer.org/csdl/proceedi … 1600b150/1A4Q40AvPRm

Provided by
Ruhr-Universitaet-Bochum

Citation:
Radio waves for the detection of hardware tampering (2022, June 7)
retrieved 22 June 2022
from https://techxplore.com/news/2022-06-radio-hardware-tampering.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.

Previous Post

Children under five begin to receive Covid vaccines in ‘the only country in the world doing this’

Next Post

Tiverton And Wakefield By-Election Defeats Could Lead To New Vote To Replace Boris Johnson, Says Tory MP

Related Posts

Mimicking the function of Ruffini receptors using a bio-inspired artificial skin
Technology

Mimicking the function of Ruffini receptors using a bio-inspired artificial skin

Credit: Nature Machine Intelligence (2022)....

Read more
To beat the summer heat, passive cooling really works
Technology

To beat the summer heat, passive cooling really works

Credit: Pixabay/CC0 Public Domain Opening...

Read more
An AI system trained to find an equitable policy for distributing public funds in an online game
Technology

An AI system trained to find an equitable policy for distributing public funds in an online game

Illustration of the game and...

Read more
Study finds toxicity in the open-source community varies from other internet forums
Technology

Study finds toxicity in the open-source community varies from other internet forums

Credit: Pixabay/CC0 Public Domain Trolls,...

Read more
A model that allows robots to follow and guide humans in crowded environments
Technology

A model that allows robots to follow and guide humans in crowded environments

The agent introduced by the...

Read more
Load More
Next Post

Tiverton And Wakefield By-Election Defeats Could Lead To New Vote To Replace Boris Johnson, Says Tory MP

  • Trending
  • Comments
  • Latest
Model Christy Giles found dead on footpath after night out in LA

Model Christy Giles found dead on footpath after night out in LA

‘RHOBH’ Star Stormed Out of Kyle Richards’ House After ‘Big Fight’

‘RHOBH’ Star Stormed Out of Kyle Richards’ House After ‘Big Fight’

Horror as goat gives birth to ‘humanoid kid’ with baby-like face

Ex-porn star Lana Rhoades flaunts 2.5st weight loss two weeks after giving birth

Ex-porn star Lana Rhoades flaunts 2.5st weight loss two weeks after giving birth

31 July Prompts to Heat up Your Socials This Summer

31 July Prompts to Heat up Your Socials This Summer

Computer scientists create tool that can desegregate schools – and shorten bus routes

Computer scientists create tool that can desegregate schools – and shorten bus routes

How to Stop Procrastinating and Get Things Done with ADHD

How to Stop Procrastinating and Get Things Done with ADHD

Cherry Ice Cream – Barefeet in the Kitchen

Cherry Ice Cream – Barefeet in the Kitchen

About Us

Todayheadline the independent news and topics discovery
A home-grown and independent news and topic aggregation . displays breaking news linking to news websites all around the world.

Follow Us

Latest News

31 July Prompts to Heat up Your Socials This Summer

31 July Prompts to Heat up Your Socials This Summer

Computer scientists create tool that can desegregate schools – and shorten bus routes

Computer scientists create tool that can desegregate schools – and shorten bus routes

31 July Prompts to Heat up Your Socials This Summer

31 July Prompts to Heat up Your Socials This Summer

Computer scientists create tool that can desegregate schools – and shorten bus routes

Computer scientists create tool that can desegregate schools – and shorten bus routes

How to Stop Procrastinating and Get Things Done with ADHD

How to Stop Procrastinating and Get Things Done with ADHD

  • Real Estate
  • Education
  • Parenting
  • Cooking
  • NFL Games On TV Today
  • Travel and Tourism
  • Home & Garden
  • Pets
  • Privacy & Policy
  • Contact
  • About

© 2021 All rights are reserved Todayheadline

No Result
View All Result
  • Real Estate
  • Education
  • Parenting
  • Cooking
  • NFL Games On TV Today
  • Travel and Tourism
  • Home & Garden
  • Pets
  • Privacy & Policy
  • Contact
  • About

© 2021 All rights are reserved Todayheadline

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....