{"id":11659,"date":"2023-08-28T10:00:14","date_gmt":"2023-08-28T07:00:14","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=11659"},"modified":"2023-08-21T23:29:40","modified_gmt":"2023-08-21T20:29:40","slug":"led-data-exfiltration","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/led-data-exfiltration\/11659\/","title":{"rendered":"LED ile veri s\u0131zd\u0131rma"},"content":{"rendered":"<p>ABD ve \u0130srail \u00fcniversitelerinden bir grup ara\u015ft\u0131rmac\u0131, \u201cvideo tabanl\u0131 kriptanaliz\u201d y\u00f6ntemini a\u00e7\u0131klayan bir <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/eprint.iacr.org\/2023\/923\">makale<\/a> yay\u0131nlad\u0131. T\u0131pk\u0131 makalenin kendisi gibi bu terim de olduk\u00e7a karma\u015f\u0131k. Ancak, her zaman oldu\u011fu gibi, hepsini sade bir dille a\u00e7\u0131klamaya \u00e7al\u0131\u015faca\u011f\u0131z.<\/p>\n<h2>Video tabanl\u0131 kriptanaliz sald\u0131r\u0131s\u0131<\/h2>\n<p>Bu teknolojiyi kullanan ger\u00e7ek bir sald\u0131r\u0131 hayal edelim. B\u00f6yle bir sald\u0131r\u0131 a\u015fa\u011f\u0131daki \u015fekilde geli\u015febilir. Sald\u0131rganlar, bir \u015firket binas\u0131ndaki video g\u00f6zetim sistemine eri\u015fim sa\u011flar. Kameralardan biri gizli belgelerin tutuldu\u011fu y\u00fcksek g\u00fcvenlikli bir depo odas\u0131n\u0131n kap\u0131s\u0131na do\u011frultulmu\u015f olsun. Kap\u0131da da ak\u0131ll\u0131 kart okuyucu var. Bir \u015firket \u00e7al\u0131\u015fan\u0131 kap\u0131ya yakla\u015f\u0131yor ve kart\u0131n\u0131 okuyucuya sokuyor; b\u00f6ylece kilit a\u00e7\u0131l\u0131yor.<\/p>\n<p>Ak\u0131ll\u0131 kart, okuyucuyla etkile\u015fime giren bir mikro\u00e7ip i\u00e7erir. Ak\u0131ll\u0131 kartta kodlanan anahtar\u0131 okuyucudaki verilerle do\u011frulamak i\u00e7in okuyucu kriptografik bir algoritma, yani bir dizi hesaplama ger\u00e7ekle\u015ftirir. Normal bir durumda, orijinalini ele ge\u00e7irmeyi ba\u015farsan\u0131z bile b\u00f6yle bir anahtar\u0131n kopyas\u0131n\u0131 \u00e7\u0131karmak son derece zordur. Ancak bu senaryoda bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 var: okuyucunun LED\u2019i. Bu durum, cihaz\u0131n \u00e7al\u0131\u015ft\u0131\u011f\u0131 anlam\u0131na gelir. Yani, bir ziyaret\u00e7iye izin verildi\u011finde ve kap\u0131n\u0131n a\u00e7\u0131labilece\u011fi durumlarda, LED\u2019in rengi k\u0131rm\u0131z\u0131dan ye\u015file d\u00f6necektir.<\/p>\n<p>G\u00f6stergenin parlakl\u0131\u011f\u0131, okuyucu sistemlerindeki y\u00fcke ba\u011fl\u0131 olarak kriptografik i\u015flem s\u0131ras\u0131nda de\u011fi\u015fir. \u00d6rne\u011fin, okuyucunun i\u015flemcisi hesaplamalarla me\u015fgul oldu\u011funda LED parlakl\u0131\u011f\u0131 biraz d\u00fc\u015fer. Bu k\u00fc\u00e7\u00fck de\u011fi\u015fimleri analiz ederek, \u00f6zel anahtar\u0131 yeniden olu\u015fturmak ve b\u00f6ylece gizli odan\u0131n kap\u0131s\u0131n\u0131 a\u00e7an bir ak\u0131ll\u0131 kart yaratmak m\u00fcmk\u00fcnd\u00fcr. Potansiyel sald\u0131rganlar\u0131n binadaki bir video kameraya eri\u015fimi varsa ve okuyucu LED\u2019inin video g\u00f6r\u00fcnt\u00fclerini alabilirlerse, teorik olarak binan\u0131n g\u00fcvenlik sistemine girebilirler.<\/p>\n<h2>Pratikteki zorluklar<\/h2>\n<p>Bu gibi makalelerdeki teoriyi prati\u011fe d\u00f6kmek hi\u00e7bir zaman kolay de\u011fildir. Yukar\u0131daki senaryonun yak\u0131n zamanda pratikte uygulanmas\u0131 olas\u0131 de\u011fildir. Donan\u0131m g\u00fcvenli\u011fi uzmanlar\u0131 a\u00e7\u0131s\u0131ndan bakt\u0131\u011f\u0131m\u0131zda ise bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 yeni bir \u015fey de\u011fil. Bu, klasik bir yan kanal sald\u0131r\u0131s\u0131 durumudur. Ba\u015fka bir deyi\u015fle, bir cihaz\u0131n i\u015fleyi\u015finde \u00f6n planda olmay\u0131p g\u00f6r\u00fcnmeyen baz\u0131 i\u015flemleri kullanarak veri s\u0131zd\u0131rmak. Veri \u015fifreleme algoritmalar\u0131 kullanan ak\u0131ll\u0131 kartlara ve di\u011fer cihazlara sald\u0131r\u0131rken kullan\u0131lan geleneksel y\u00f6ntem, cihazdaki voltaj\u0131 \u00f6l\u00e7mektir. Hesaplamalar s\u0131ras\u0131nda bu voltaj biraz de\u011fi\u015fir. Bir sald\u0131rgan, bu k\u00fc\u00e7\u00fck de\u011fi\u015fiklikleri g\u00f6zlemleyerek algoritmay\u0131 tersine \u00e7evirebilir: \u00f6rne\u011fin, bir voltaj d\u00fc\u015f\u00fc\u015f\u00fcn\u00fc i\u015flenmekte olan belirli bir de\u011ferle ili\u015fkilendirebilir.<\/p>\n<p>Bu t\u00fcr yan kanal sald\u0131r\u0131lar\u0131n\u0131n bir \u00f6zelli\u011fi de hesaplamalar\u0131n \u00e7ok h\u0131zl\u0131 olmas\u0131d\u0131r. \u015eifreleme anahtar\u0131n\u0131 yeniden yap\u0131land\u0131rmak i\u00e7in voltaj\u0131 saniyede y\u00fczlerce hatta binlerce kez \u00f6l\u00e7mek gerekir. Ancak LED, cihaz\u0131n genel g\u00fc\u00e7 kayna\u011f\u0131 devresinin bir par\u00e7as\u0131d\u0131r, bu da LED parlakl\u0131\u011f\u0131n\u0131n voltaja g\u00f6re de\u011fi\u015fti\u011fi anlam\u0131na gelir. Bu alandaki ilerlemeleri g\u00f6z ard\u0131 etmeyin; \u00e7\u00fcnk\u00fc LED odakl\u0131 sald\u0131r\u0131lar art\u0131k karma\u015f\u0131k ve pahal\u0131 ekipman gerektirmiyor. Art\u0131k cihaz\u0131 par\u00e7alara ay\u0131rmaya ve kablolar\u0131 devre kart\u0131na lehimlemeye gerek yok. Sadece video kameray\u0131 LED\u2019e do\u011frultman\u0131z, kay\u0131t alman\u0131z ve kayd\u0131 analiz etmeniz istedi\u011finiz sonucu alman\u0131z i\u00e7in yeterli.<\/p>\n<h2>Video analiz \u00f6zellikleri<\/h2>\n<p>Makalenin yazarlar\u0131, video g\u00f6r\u00fcnt\u00fclerini pratikte analiz ederken \u00e7ok say\u0131da zorlukla kar\u015f\u0131la\u015ft\u0131. Normal bir kamera saniyede 60 kare h\u0131z\u0131nda video \u00e7ekerken, geli\u015fmi\u015f bir kamera ise en fazla 120 kare h\u0131z\u0131nda video kaydedebilir. \u015eifreleme algoritmas\u0131n\u0131 hedefleyen bir sald\u0131r\u0131 i\u00e7in bu olduk\u00e7a d\u00fc\u015f\u00fck bir de\u011ferdir. Bu y\u00f6ntemi geli\u015ftirmek i\u00e7in ara\u015ft\u0131rmac\u0131lar, herhangi bir dijital kamerada bulunan ve \u00fcreticilerin tipik olarak \u00fcstesinden gelmekte zorland\u0131klar\u0131 bir kusurdan yararland\u0131: deklan\u015f\u00f6r. Deklan\u015f\u00f6re bast\u0131\u011f\u0131m\u0131zda kameran\u0131n g\u00f6r\u00fcnt\u00fc sens\u00f6r\u00fc anl\u0131k foto\u011fraf \u00e7ekmez. Sens\u00f6r\u00fcn pikselleri s\u0131rayla, \u00e7izgisel olarak, yukar\u0131dan a\u015fa\u011f\u0131ya taran\u0131r. Y\u00fcksek h\u0131zda hareket eden bir nesnenin foto\u011fraf\u0131n\u0131 \u00e7ekersek, yapt\u0131\u011f\u0131m\u0131z bu \u00e7ekim sanatsal efektler \u00fcretebilir. Bir helikopterin d\u00f6nen kanatlar\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcn.<\/p>\n<div id=\"attachment_11662\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/21232601\/led-data-exfiltration-rolling-shutter.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11662\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/21232601\/led-data-exfiltration-rolling-shutter.jpg\" alt=\"Tipik deklan\u015f\u00f6r \u00f6rne\u011fi.\" width=\"600\" height=\"800\" class=\"size-full wp-image-11662\"><\/a><p id=\"caption-attachment-11662\" class=\"wp-caption-text\">Dijital kamera, g\u00f6r\u00fcnt\u00fc sens\u00f6r\u00fcnden gelen verileri s\u0131ral\u0131 olarak okur; ancak pervanenin belli bir d\u00f6n\u00fc\u015f s\u00fcresi vard\u0131r. Sonu\u00e7 olarak bozuk bir g\u00f6r\u00fcnt\u00fc ortaya \u00e7\u0131kar. <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/jasmcole.com\/2014\/10\/12\/rolling-shutters\/\">Kaynak<\/a><\/p><\/div>\n<p>Ara\u015ft\u0131rmac\u0131lar \u015fu \u015fekilde ilerlediler: kameray\u0131 kadraj\u0131n neredeyse t\u00fcm alan\u0131n\u0131 dolduracak \u015fekilde LED\u2019e yakla\u015ft\u0131rd\u0131lar. Sonra t\u00fcm kadraj yerine her bir \u00e7izginin parlakl\u0131\u011f\u0131n\u0131 \u00f6l\u00e7t\u00fcler. Dolay\u0131s\u0131yla, \u201c\u00f6l\u00e7\u00fcm frekans\u0131\u201d \u2014 ve do\u011fruluk pay\u0131 \u2014 muazzam bir art\u0131\u015f g\u00f6sterdi. \u00d6rne\u011fin, iPhone 14 kameray\u0131 ele al\u0131rsak, saniyede 61.400 defaya kadar. \u0130lgin\u00e7 bir \u015fekilde, bu olduk\u00e7a s\u0131ra d\u0131\u015f\u0131 kamera kullan\u0131m senaryosunda iPhone, kaydedilen veri miktar\u0131 a\u00e7\u0131s\u0131ndan Samsung\u2019u geride b\u0131rakt\u0131.<\/p>\n<div id=\"attachment_11663\" style=\"width: 1566px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/21232602\/led-data-exfiltration-phones.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11663\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/21232602\/led-data-exfiltration-phones.jpg\" alt=\"Ak\u0131ll\u0131 telefonlar\u0131n LED parlakl\u0131\u011f\u0131nda k\u00fc\u00e7\u00fck de\u011fi\u015fiklikleri yakalama yetene\u011fi test ediliyor.\" width=\"1556\" height=\"849\" class=\"size-full wp-image-11663\"><\/a><p id=\"caption-attachment-11663\" class=\"wp-caption-text\">Ak\u0131ll\u0131 telefonlar\u0131n, belirli bir frekansta LED parlakl\u0131\u011f\u0131nda k\u00fc\u00e7\u00fck de\u011fi\u015fiklikleri yakalama yetene\u011fi test ediliyor. <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/eprint.iacr.org\/2023\/923.pdf\">Kaynak<\/a><\/p><\/div>\n<p>Yukar\u0131daki ekran g\u00f6r\u00fcnt\u00fcs\u00fc, bu iyile\u015ftirilmi\u015f yap\u0131land\u0131rma sonucu elde edilen geli\u015fmeyi g\u00f6steriyor. Ara\u015ft\u0131rmac\u0131lar, LED\u2019in belirli bir frekansta yan\u0131p s\u00f6nmesini sa\u011flad\u0131 ve LED\u2019i kademeli olarak art\u0131rd\u0131. LED\u2019in a\u00e7\u0131l\u0131p kapanmas\u0131, g\u00fc\u00e7 dalgalanmalar\u0131n\u0131n \u00f6l\u00e7\u00fclmesiyle (sol \u00fcstte) a\u00e7\u0131k\u00e7a g\u00f6r\u00fclebilir. \u00d6zel bir fotosens\u00f6r (sa\u011f \u00fcst) kullan\u0131ld\u0131\u011f\u0131nda LED parlakl\u0131\u011f\u0131ndaki de\u011fi\u015fiklik net bir \u015fekilde g\u00f6r\u00fclebilir. Testte iki ak\u0131ll\u0131 telefon video kamera olarak kullan\u0131ld\u0131 (alt s\u0131ra). G\u00f6rd\u00fc\u011f\u00fcm\u00fcz gibi, LED\u2019in yan\u0131p s\u00f6nmesi olduk\u00e7a d\u00fc\u015f\u00fck bir frekansta kaydedildi; parlakl\u0131ktaki daha y\u00fcksek frekans de\u011fi\u015fiklikleri kayboldu. Ancak temel g\u00f6r\u00fcnt\u00fc karesi h\u0131z\u0131nda (saniyede 60 veya 120 kez), bu sonu\u00e7lara ula\u015f\u0131lmas\u0131 dahi m\u00fcmk\u00fcn de\u011fildir. Elde edilen bu iyile\u015ftirme, ba\u015far\u0131l\u0131 bir sald\u0131r\u0131 i\u00e7in yeterli oldu.<\/p>\n<h2>Sald\u0131r\u0131 sonu\u00e7lar\u0131<\/h2>\n<p>Ara\u015ft\u0131rmac\u0131lar, pratikte \u201cvideo sald\u0131r\u0131s\u0131\u201d olas\u0131l\u0131\u011f\u0131n\u0131 kan\u0131tlamak i\u00e7in \u00f6zel bir \u015fifreleme anahtar\u0131n\u0131n \u00e7e\u015fitli ak\u0131ll\u0131 kart okuyucular\u0131ndan nas\u0131l d\u0131\u015far\u0131 s\u0131zd\u0131r\u0131labilece\u011fini g\u00f6sterdiler. Be\u015f deneyin her birinde, LED\u2019in istenilen bilgiyi s\u0131zd\u0131rmas\u0131 sa\u011fland\u0131. Teoride, ak\u0131ll\u0131 telefonun veya video kameran\u0131n cihaz\u0131n yak\u0131n\u0131nda olmas\u0131 bile gerekli de\u011fildir; belirli ko\u015fullar alt\u0131nda, sinyal 60 metreye kadar uzaktan kaydedilebilir. Ekip ayr\u0131ca, ba\u015fka \u0131\u015f\u0131k kaynaklar\u0131n\u0131n (\u00f6rne\u011fin, g\u00fcne\u015f \u0131\u015f\u0131\u011f\u0131 alan bir oda) varl\u0131\u011f\u0131n\u0131n da \u00f6l\u00e7\u00fcm do\u011frulu\u011funu etkiledi\u011fini tespit etti. Bu durum, faydal\u0131 sinyali etkileyerek sald\u0131r\u0131y\u0131 karma\u015f\u0131kla\u015ft\u0131r\u0131r, ancak sonu\u00e7 a\u00e7\u0131s\u0131ndan kritik \u00f6nemde de\u011fildir.<\/p>\n<p>Hepsi bu kadar da de\u011fil. Ara\u015ft\u0131rmac\u0131lar, SIKE veri \u015fifreleme algoritmas\u0131n\u0131 \u00e7al\u0131\u015ft\u0131ran bir Samsung Galaxy S8\u2019e sald\u0131rd\u0131.<\/p>\n<div id=\"attachment_11661\" style=\"width: 1102px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/21232602\/led-data-exfiltration-phone-attack.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11661\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/21232602\/led-data-exfiltration-phone-attack.jpg\" alt=\"Bir ak\u0131ll\u0131 telefondan gizli verileri d\u0131\u015far\u0131 s\u0131zd\u0131rmak.\" width=\"1092\" height=\"584\" class=\"size-full wp-image-11661\"><\/a><p id=\"caption-attachment-11661\" class=\"wp-caption-text\">Bir ak\u0131ll\u0131 telefondan gizli verileri d\u0131\u015far\u0131 s\u0131zd\u0131rmak. <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/eprint.iacr.org\/2023\/923.pdf\">Kaynak<\/a><\/p><\/div>\n<p>Bir ak\u0131ll\u0131 telefonun, cihaz a\u00e7\u0131ld\u0131\u011f\u0131nda yanan bir LED\u2019i yoktur. Ancak ara\u015ft\u0131rmac\u0131lar sald\u0131rganlar\u0131n ak\u0131ll\u0131 telefonlara y\u00f6nelik ne gibi kurnazl\u0131klar d\u00fc\u015f\u00fcnebilece\u011fini \u00f6ng\u00f6rmeye \u00e7al\u0131\u015ft\u0131lar ve telefona LED\u2019i olan ta\u015f\u0131nabilir hoparl\u00f6rler ba\u011flad\u0131lar! Hoparl\u00f6rler ak\u0131ll\u0131 telefon taraf\u0131ndan \u00e7al\u0131\u015ft\u0131r\u0131ld\u0131\u011f\u0131 i\u00e7in, LED parlakl\u0131\u011f\u0131n\u0131n i\u015flemci y\u00fck\u00fcne ba\u011fl\u0131 oldu\u011fu senaryo bu denemede de tekrarland\u0131.<\/p>\n<p>Sonu\u00e7 olarak telefona bir Hertzbleed sald\u0131r\u0131s\u0131 yap\u0131ld\u0131 (ayr\u0131nt\u0131lar i\u00e7in <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/hertzbleed-attack\/10883\/\" rel=\"noopener\">buraya<\/a> bak\u0131n). B\u00f6ylece, ARM mimarisine dayal\u0131 i\u015flemcilerin de bu t\u00fcr bir sald\u0131r\u0131 riski alt\u0131nda oldu\u011fu do\u011fruland\u0131 (orijinal belge yaln\u0131zca x86 mimarisine sahip Intel ve AMD \u00e7iplerindeki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kaps\u0131yor).<\/p>\n<p>\u015eimdi ise tamamen teorik bir deneyden bahsedece\u011fiz, ger\u00e7ekte kullan\u0131mda olan herhangi bir \u015fifreleme anahtar\u0131n\u0131 \u00e7almaktan de\u011fil. Ak\u0131ll\u0131 telefondaki kriptografik hesaplamalar belirli bir algoritmaya g\u00f6re tetiklendi. Ara\u015ft\u0131rmac\u0131lar, telefona ba\u011fl\u0131 hoparl\u00f6rlerdeki LED\u2019in parlakl\u0131\u011f\u0131n\u0131 \u00f6l\u00e7erek algoritman\u0131n i\u015fleyi\u015fini yakalamay\u0131 ve \u00f6zel anahtar\u0131 kurtarmay\u0131 ba\u015fard\u0131. Ak\u0131ll\u0131 telefon, ak\u0131ll\u0131 kart okuyucudan \u00e7ok daha karma\u015f\u0131k oldu\u011fu i\u00e7in, \u00f6l\u00e7\u00fcmlerdeki g\u00fcr\u00fclt\u00fc seviyesi \u00e7ok daha y\u00fcksekti. Bununla birlikte, deney ba\u015far\u0131l\u0131 oldu.<\/p>\n<h2>Bu bilimsel ara\u015ft\u0131rman\u0131n faydas\u0131 \u00fczerine<\/h2>\n<p>Bu \u00e7al\u0131\u015fman\u0131n yak\u0131n zamanda pratikte uygulanmas\u0131 muhtemel g\u00f6z\u00fckm\u00fcyor. \u00c7\u00fcnk\u00fc sald\u0131r\u0131 son derece karma\u015f\u0131k ve bu uygulamay\u0131 ger\u00e7ekle\u015ftirmek i\u00e7in ger\u00e7ek\u00e7i bir \u00f6rnek bulmak zor. \u00c7o\u011fu zaman oldu\u011fu gibi, bu t\u00fcr makalelerin as\u0131l de\u011feri, \u201cke\u015ffedilen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n\u201d pratikte kullan\u0131lmas\u0131nda sakl\u0131 de\u011fil. Belki de bu \u00e7al\u0131\u015fman\u0131n en \u00f6nemli \u00e7\u0131kar\u0131m\u0131, bir zamanlar yan kanal sald\u0131r\u0131lar\u0131 i\u00e7in gerekli olan \u00f6zel ekipmana art\u0131k ihtiya\u00e7 kalmad\u0131\u011f\u0131 ve bunlar\u0131n yerine hayat\u0131m\u0131zda s\u00fcrekli kulland\u0131\u011f\u0131m\u0131z cihazlar\u0131n ge\u00e7mi\u015f olmas\u0131d\u0131r.<\/p>\n<p>S\u0131k s\u0131k masa\u00fcst\u00fc bilgisayar hoparl\u00f6r\u00fc gibi a\u00e7\u0131k olmayan kanallar arac\u0131l\u0131\u011f\u0131yla <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/pc-speaker-data-exfiltration\/47737\/\" rel=\"noopener nofollow\">veri s\u0131zd\u0131r\u0131lmas\u0131 hakk\u0131nda g\u00f6nderiler yay\u0131nl\u0131yoruz<\/a>. Ancak t\u00fcm bu durumlarda, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n, kurban\u0131n bilgisayar\u0131na \u00f6nceden y\u00fcklenmi\u015f olmas\u0131 gerekir. Bu makale, yaln\u0131zca bir g\u00fc\u00e7 LED\u2019ini g\u00f6zlemleyerek ve \u00f6ncesinde bir bilgisayar korsanl\u0131\u011f\u0131 giri\u015fimde bulunmadan da hassas bilgilerin s\u0131zd\u0131r\u0131labilece\u011fi olas\u0131l\u0131\u011f\u0131na i\u015faret ediyor.<\/p>\n<p>Bu da yan kanal sald\u0131r\u0131lar\u0131 hakk\u0131nda bildiklerimize \u00f6nemli bir katk\u0131 sa\u011fl\u0131yor. A\u00e7\u0131klad\u0131\u011f\u0131m\u0131z t\u00fcrde sald\u0131r\u0131lara kar\u015f\u0131 savunmas\u0131z cihazlar\u0131n \u00fcreticilerinin, bu t\u00fcr g\u00fcvenlik a\u00e7\u0131klar\u0131 pratikte de istismar edilebilir hale gelmeden \u00f6nce, yeni \u00fcr\u00fcn modellerini bu ger\u00e7ekleri dikkate alarak tasarlay\u0131p geli\u015ftirmelerini umuyoruz. Sonu\u00e7ta, inceledi\u011fimiz makalenin de hakl\u0131 olarak i\u015faret etti\u011fi gibi, gizli bilgileri if\u015fa etmeyen bir LED yapmak olduk\u00e7a basittir. \u00d6rne\u011fin, g\u00fc\u00e7 kayna\u011f\u0131 devresine \u00e7ok ucuz bir kapasit\u00f6r eklemek bu sorunu \u00e7\u00f6zer. Yan kanal sald\u0131r\u0131lar\u0131na kar\u015f\u0131 \u00f6nlemler yaz\u0131l\u0131m d\u00fczeyinde de uygulanabilir. Son olarak, neden LED\u2019i tamamen ortadan kald\u0131rm\u0131yoruz? LED kald\u0131r\u0131lsa eksikli\u011fi hissedilir mi sizce?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ara\u015ft\u0131rmac\u0131lar, LED etkinli\u011fini g\u00f6zlemleyerek gizli verileri d\u0131\u015far\u0131 s\u0131zd\u0131rman\u0131n bir yolunu buldular.<\/p>\n","protected":false},"author":665,"featured_media":11660,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[2343,2654],"class_list":{"0":"post-11659","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-veri-sizdirma","11":"tag-yan-kanal"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/led-data-exfiltration\/11659\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/led-data-exfiltration\/25850\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/led-data-exfiltration\/21291\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/led-data-exfiltration\/11092\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/led-data-exfiltration\/28548\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/led-data-exfiltration\/26149\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/led-data-exfiltration\/35647\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/led-data-exfiltration\/48523\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/led-data-exfiltration\/34325\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/led-data-exfiltration\/26464\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/led-data-exfiltration\/32159\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/led-data-exfiltration\/31843\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/veri-sizdirma\/","name":"veri s\u0131zd\u0131rma"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=11659"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11659\/revisions"}],"predecessor-version":[{"id":11665,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11659\/revisions\/11665"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/11660"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=11659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=11659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=11659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}