Receiving and transmitting capabilities of modern CPUs: remote RAM communication, WiFi coupling, and injection into wired systems

2025-06-14


Abstract

With the increasing miniaturization and complexity of semiconductors and memory architectures, a previously theoretical field is being re-examined: the direct communication capability of CPU components with external RAM via electromagnetic coupling, as well as the unwanted or targeted transmission of data packets via Wireless (WiFi) and its targeted injection into wired systems (Ethernet, USB, Powerline). This article examines the technical prerequisites, previously documented effects, and the theoretical and experimental limitations of this development.


1. Introduction: CPUs as Electromagnetic Transmitters and Receivers

Modern processors (CPUs) contain billions of transistors operating at extremely high clock speeds. As a result, they inevitably generate a complex electromagnetic field pattern. Within certain limits, these patterns can—intentionally or through interference—be transmitted. Emit or receive information, especially if:

Advertising

2. Remote RAM Coupling via Electromagnetic Resonance

2.1. Theoretical Background

DRAM modules have memory cells in matrix structures that store information through charge transfer. Theoretically, a very close CPU can influence or detect the charge state through targeted EM field modulation (in the GHz range) – analogous to capacitive side-channel attacks.

2.2. Experiments with "Rowhammer" and EM Side-Channels


3. WiFi-like transmission through CPU clock modulation

3.1. Signal emission through frequency modulation

Through minimal changes in the clock rate and voltage supply of a processor (e.g., through DVFS – Dynamic Voltage and Frequency Scaling), very weak but structured signals can be emitted that can be detected at close range.

Well-known example: AirHopper attack – an infected PC transmits data to a smartphone via electromagnetic emissions from the monitor cable.

3.2. Potential for real WiFi communication?

Some researchers speculate about direct interference patterns that could enable a CPU core to send or receive minimal data packets within a tuned EM frequency range (2.4 GHz, 5 GHz) – however, these signals are extremely weak and highly susceptible to interference.


4. Injection into wired systems (cables)

4.1. Cables as antennas: From the CPU to the cable

Network cables, USB cables, or even power cables can unintentionally function as antennas. Through EM coupling and targeted clock/voltage manipulation, a signal can be injected into the cable (without an explicit network interface), data leaks can occur, or even channel modulation can be simulated through parasitic coupling.

Example: PowerHammer attack (Ben-Gurion University, 2018): Data signals are "sent" through the power line via fluctuations in the PC's power consumption.


5. Application Scenarios & Risks

Application Description Assessment
Air-Gap Attacks Data Transfer Without a Physical Connection Highly Dangerous, but Complex
Diagnostic Tools Non-Invasive EM Diagnostics of CPUs Forward-Looking
Black Box Communication Theoretical Communication Between Chips Without a Data Bus Speculative, but Conceivable
Hardware Exfiltration Use in Industrial Espionage Real Danger

6. Differentiation from Classical Communication

These phenomena are not to be confused with classic communication interfaces such as WiFi, Ethernet, etc. – they utilize physical side effects of the hardware architecture (current, field, induction, voltage). They lie at the interface between physics, IT, and security research.


7. Conclusion

Although modern CPUs and RAMs are not designed to function like radio transmitters or antennas, realistic experiments and side-channel analyses show that a basic form of information transmission at the physical level is possible. The potential – whether for diagnosis or attack – is high, but the technical feasibility is still very limited.


8. Outlook: Quantum Coupling and Bio-EM Waves

Future speculations include:


🧠 Closing quote:

“Maybe the processor isn't talking to the cable, but the cable is still listening to.”


COPYRIGHT ToNEKi Media UG (haftungsbeschränkt)

AUTOR:  THOMAS JAN POSCHADEL

CPU Sockel in Violett