/
acoustic-HDD-ashes2018.html
executable file
·121 lines (105 loc) · 7.39 KB
/
acoustic-HDD-ashes2018.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
<!DOCTYPE HTML>
<!--
Read Only by HTML5 UP
html5up.net | @ajlkn
Free for personal and commercial use under the CCA 3.0 license (html5up.net/license)
-->
<html>
<head>
<title>Acoustic Denial of Service Attacks on Hard Disk Drives</title>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<!--[if lte IE 8]><script src="assets/js/ie/html5shiv.js"></script><![endif]-->
<link rel="stylesheet" href="assets/css/main.css" />
<link rel="stylesheet" href="assets/css/academicons.css"/>
<link rel="stylesheet" href="assets/css/label.css" />
<!--[if lte IE 8]><link rel="stylesheet" href="assets/css/ie8.css" /><![endif]-->
</head>
<body>
<section id="header">
<header>
<span class="image avatar"><img src="./images/mohammad_shahrad.jpg"></span>
<h1 id="logo"><a href="./index.html">Mohammad Shahrad</a></h1>
<p></p>
mohammad\DoT\shahrad/AT/ubc.ca</p>
</header>
<nav id="nav">
<ul>
<li><a href="./index.html">Homepage</a></li>
</ul>
</nav>
<footer>
<ul class="icons">
<li><a href="https://twitter.com/MShahrad" class="icon fa-twitter fa-2x"><span class="label">Twitter</span></a></li>
<li><a href="https://www.linkedin.com/in/mshahrad" class="icon fa-linkedin fa-2x"><span class="label">LinkedIn</span></a></li>
<li><a href="https://scholar.google.com/citations?user=iXgmttoAAAAJ&hl=en" class="ai ai-google-scholar-square ai-3x"><span class="label"></span></a></li>
<!-- <li><a href="#" class="icon fa-envelope fa-2x"><span class="label">Email</span></a></li> -->
</ul>
</footer>
</section>
<!-- Wrapper -->
<div id="wrapper">
<!-- Main -->
<div id="main">
<!-- One -->
<section id="one_acoustic">
<div class="container">
<header class="major">
<h3>Acoustic Denial of Service Attacks on Hard Disk Drives</h3>
<h4><a href="http://ashesworkshop.org" target="_blank">ACM CCS ASHES '18</a></h4>
</header>
<br>
<p>Bridging concepts from information security and resonance theory, we propose a novel denial of service attack against hard disk drives (HDDs). In this attack, acoustic signals are used to cause rotational vibrations in HDD platters in an attempt to create failures in read/write operations, ultimately halting the correct operation of HDDs.</p>
<p>We perform a comprehensive examination of multiple HDDs to characterize the attack and show the feasibility of the attack in two real-world systems, namely, surveillance devices and personal computers. Our attack highlights an overlooked security vulnerability of HDDs, introducing a new threat that can potentially endanger the security of numerous systems.</p>
You may access the paper PDF for free through the ACM Author-Izer link, below:<br><br>
<!-- ACM DL Article: Acoustic Denial of Service Attacks on Hard Disk Drives -->
<div class="acmdlitem" id="item3266448"><img src="//dl.acm.org/images/oa.gif" width="25" height="25" border="0" alt="ACM DL Author-ize service" style="vertical-align:middle"/><a href="https://dl.acm.org/authorize?N663850" title="Acoustic Denial of Service Attacks on Hard Disk Drives">Acoustic Denial of Service Attacks on Hard Disk Drives</a><div style="margin-left:25px"><a href="https://dl.acm.org/author_page.cfm?id=99658993442" >Mohammad Shahrad</a>, <a href="https://dl.acm.org/author_page.cfm?id=99659158848" >Arsalan Mosenia</a>, <a href="https://dl.acm.org/author_page.cfm?id=99659314314" >Liwei Song</a>, <a href="https://dl.acm.org/author_page.cfm?id=99659253378" >Mung Chiang</a>, <a href="https://dl.acm.org/author_page.cfm?id=81100339831" >David Wentzlaff</a>, <a href="https://dl.acm.org/author_page.cfm?id=81375616228" >Prateek Mittal</a><br />ASHES '18 Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018</div></div>
<!-- ACM DL Bibliometrics: Acoustic Denial of Service Attacks on Hard Disk Drives-->
<div class="acmdlstat" id ="stats3266448"><iframe src="https://dl.acm.org/authorizestats?N663850" width="100%" height="30" scrolling="no" frameborder="0">frames are not supported</iframe></div>
<br>
<ul class="actions">
<li><a href="https://parallel.princeton.edu/papers/ashes18-shahrad.pdf" class="button special icon fa-file-pdf-o">Paper</a></li>
<li><a href="bibtex/acoustic_denial_of_service_attacks_on_hard_disk_drives.bib" class="button special icon fa-download" download="acoustic_denial_of_service_attacks_on_hard_disk_drives.bib">BibTex</a></li>
</ul>
Our work has been mentioned in some news articles, including:
<ul>
<li><a href="https://konnect.serene-risc.ca/2018/01/22/the-delicate-sound-of-threat-vectors/">The delicate sound of threat vectors</a>. SERENE-RISC. 1/22/2018.</li>
<li><a href="https://www.hstoday.us/columns/critical-issues-in-national-cybersecurity/researchers-find-denial-service-attacks-mounted-acoustic-signals/">Researchers Find Denial-of-Service Attacks Mounted Through Acoustic Signals</a>. Homeland Security Today. 1/18/2018.</li>
<li><a href="https://www.helpnetsecurity.com/2018/01/16/dos-attacks-against-hard-disk-drives/">DoS attacks against hard disk drives using acoustic signals</a>. Help Net Security. 1/16/2018.</li>
<li><a href="https://hotforsecurity.bitdefender.com/blog/researchers-use-sound-to-compromise-hard-drives-in-new-dos-proof-of-concept-19373.html">Researchers use sound to compromise hard drives in new DOS proof-of-concept</a>. Hot For Security. 12/27/2017.</li>
<li><a href="https://www.bleepingcomputer.com/news/security/acoustic-attacks-on-hdds-can-sabotage-pcs-cctv-systems-atms-more/">Acoustic Attacks on HDDs Can Sabotage PCs, CCTV Systems, ATMs, More</a>. Bleeping Computer. 12/27/2017.</li>
<li><a href="https://www.schneier.com/blog/archives/2017/12/acoustical_atta.html">Acoustical Attacks against Hard Drives</a>. Schneier on Security. 12/26/2017.</li>
</ul>
<br>
<a href="https://twitter.com/share" class="twitter-share-button" data-show-count="false">Tweet</a><script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
</div>
</section>
</div>
<!-- Footer -->
<section id="footer">
<div class="container">
<ul class="copyright">
<!-- <li>© Untitled. All rights reserved.</li> -->
<li>Design: <a href="https://html5up.net/">HTML5 UP</a></li>
</ul>
</div>
</section>
</div>
<!-- Scripts -->
<script src="assets/js/jquery.min.js"></script>
<script src="assets/js/jquery.scrollzer.min.js"></script>
<script src="assets/js/jquery.scrolly.min.js"></script>
<script src="assets/js/skel.min.js"></script>
<script src="assets/js/util.js"></script>
<!--[if lte IE 8]><script src="assets/js/ie/respond.min.js"></script><![endif]-->
<script src="assets/js/main.js"></script>
<!-- Global site tag (gtag.js) - Google Analytics -->
<script async src="https://www.googletagmanager.com/gtag/js?id=UA-80541256-2"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag(){dataLayer.push(arguments);}
gtag('js', new Date());
gtag('config', 'UA-80541256-2');
</script>
</body>
</html>