PLATYPUS: Software-based power side-channel attacks on x86
Power side-channel attacks exploit variations in power consumption to extract secrets from a
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …
Device fingerprinting for cyber-physical systems: a survey
The continued growth of the cyber-physical system (CPS) and Internet of Things
technologies raises device security and monitoring concerns. For device identification …
technologies raises device security and monitoring concerns. For device identification …
Spectre is here to stay: An analysis of side-channels and speculative execution
The recent discovery of the Spectre and Meltdown attacks represents a watershed moment
not just for the field of Computer Security, but also of Programming Languages. This paper …
not just for the field of Computer Security, but also of Programming Languages. This paper …
A survey on air-gap attacks: Fundamentals, transport means, attack scenarios and challenges
J Park, J Yoo, J Yu, J Lee, JS Song - Sensors, 2023 - mdpi.com
Major public institutions and organizations that handle sensitive data frequently enforce
strong security policies by implementing network separation policies that segregates their …
strong security policies by implementing network separation policies that segregates their …
Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields
M Guri - Future Generation Computer Systems, 2021 - Elsevier
This papers shows that attackers can leak data from isolated, air-gapped computers to
nearby smartphones via covert magnetic signals. The proposed covert channel works even …
nearby smartphones via covert magnetic signals. The proposed covert channel works even …
{Charger-Surfing}: Exploiting a power line {Side-Channel} for smartphone information leakage
Touchscreen-based mobile devices such as smartphones and tablets are used daily by
billions of people for productivity and entertainment. This paper uncovers a new security …
billions of people for productivity and entertainment. This paper uncovers a new security …
Capspeaker: Injecting voices to microphones via capacitors
Voice assistants can be manipulated by various malicious voice commands, yet existing
attacks require a nearby speaker to play the attack commands. In this paper, we show that …
attacks require a nearby speaker to play the attack commands. In this paper, we show that …
air-jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (ir)
M Guri, D Bykhovsky - Computers & Security, 2019 - Elsevier
Breaching highly secure networks with advanced persistent threats (APTs) has been proven
feasible in the last decade, however communication between the attacker outside the …
feasible in the last decade, however communication between the attacker outside the …
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage
I Giechaskiel, KB Rasmussen… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Field-Programmable Gate Arrays (FPGAs) are versatile, reconfigurable integrated circuits
that can be used as hardware accelerators to process highly-sensitive data. Leaking this …
that can be used as hardware accelerators to process highly-sensitive data. Leaking this …
Covert channel communication as an emerging security threat in 2.5 d/3d integrated systems
In this paper, first, a broad overview of existing covert channel communication-based
security attacks is provided. Such covert channels establish a communication link between …
security attacks is provided. Such covert channels establish a communication link between …