PowerHammer: Exfiltrating data from air-gapped computers through power lines

M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …

[PDF][PDF] PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

M Guri, B Zadov, D Bykhovsky, Y Elovici - academia.edu
In this paper we provide an implementation, evaluation, and analysis of PowerHammer, a
malware (bridgeware [1]) that uses power lines to exfiltrate data from air-gapped computers …

PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

M Guri, B Zadov, D Bykhovsky, Y Elovici - arXiv preprint arXiv:1804.04014, 2018 - arxiv.org
In this paper we provide an implementation, evaluation, and analysis of PowerHammer, a
malware (bridgeware [1]) that uses power lines to exfiltrate data from air-gapped computers …

PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

M Guri, B Zadov, D Bykhovsky, Y Elovici - arXiv e-prints, 2018 - ui.adsabs.harvard.edu
In this paper we provide an implementation, evaluation, and analysis of PowerHammer, a
malware (bridgeware [1]) that uses power lines to exfiltrate data from air-gapped computers …

PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

M Guri, B Zadov, D Bykhovsky, Y Elovici - IEEE Transactions on …, 2020 - cris.bgu.ac.il
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …