PLATYPUS: Software-based power side-channel attacks on x86

M Lipp, A Kogler, D Oswald, M Schwarz… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Power side-channel attacks exploit variations in power consumption to extract secrets from a
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …

Device fingerprinting for cyber-physical systems: a survey

V Kumar, K Paul - ACM Computing Surveys, 2023 - dl.acm.org
The continued growth of the cyber-physical system (CPS) and Internet of Things
technologies raises device security and monitoring concerns. For device identification …

Spectre is here to stay: An analysis of side-channels and speculative execution

R Mcilroy, J Sevcik, T Tebbi, BL Titzer… - arXiv preprint arXiv …, 2019 - arxiv.org
The recent discovery of the Spectre and Meltdown attacks represents a watershed moment
not just for the field of Computer Security, but also of Programming Languages. This paper …

A survey on air-gap attacks: Fundamentals, transport means, attack scenarios and challenges

J Park, J Yoo, J Yu, J Lee, JS Song - Sensors, 2023 - mdpi.com
Major public institutions and organizations that handle sensitive data frequently enforce
strong security policies by implementing network separation policies that segregates their …

Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields

M Guri - Future Generation Computer Systems, 2021 - Elsevier
This papers shows that attackers can leak data from isolated, air-gapped computers to
nearby smartphones via covert magnetic signals. The proposed covert channel works even …

{Charger-Surfing}: Exploiting a power line {Side-Channel} for smartphone information leakage

P Cronin, X Gao, C Yang, H Wang - 30th USENIX Security Symposium …, 2021 - usenix.org
Touchscreen-based mobile devices such as smartphones and tablets are used daily by
billions of people for productivity and entertainment. This paper uncovers a new security …

Capspeaker: Injecting voices to microphones via capacitors

X Ji, J Zhang, S Jiang, J Li, W Xu - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Voice assistants can be manipulated by various malicious voice commands, yet existing
attacks require a nearby speaker to play the attack commands. In this paper, we show that …

air-jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (ir)

M Guri, D Bykhovsky - Computers & Security, 2019 - Elsevier
Breaching highly secure networks with advanced persistent threats (APTs) has been proven
feasible in the last decade, however communication between the attacker outside the …

C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage

I Giechaskiel, KB Rasmussen… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Field-Programmable Gate Arrays (FPGAs) are versatile, reconfigurable integrated circuits
that can be used as hardware accelerators to process highly-sensitive data. Leaking this …

Covert channel communication as an emerging security threat in 2.5 d/3d integrated systems

I Miketic, K Dhananjay, E Salman - Sensors, 2023 - mdpi.com
In this paper, first, a broad overview of existing covert channel communication-based
security attacks is provided. Such covert channels establish a communication link between …