About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
CS2/HiPEAC 2019
Conference paper
4KDump: Exfiltrating files via hexdump and video capture
Abstract
This paper presents an exfiltration attack that targets systems with tight security measures; no connectivity and no ability to mount external devices. Our approach utilizes a mobile camera or a screen recorder to capture video while hexdump’ing a file using pre-installed utilities found in most operating systems. The captured video is analyzed at the attacker side using optical character recognition engines and the recognized letters are used to reconstruct the files. Our approach provides a 100% reconstruction rate given that console fonts can be perfectly recognized by OCR engines. We measure the exfiltration speed of our attack and show that we achieve up to 410 KBps when capturing video via mobile phones. We propose a set of defenses that can negate the attack while maintaining usability of the console.