The security in optical wireless communication: A survey

X Zhang, G Klevering, X Lei, Y Hu, L Xiao… - ACM Computing …, 2023 - dl.acm.org
With the demand for economical and high-speed wireless services, Optical Wireless
Communication (OWC) has attracted increasing attention in both research and the market. In …

Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures

A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023 - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by
developing advanced cyber weapons. They have equipped with the most advanced …

Netspectre: Read arbitrary memory over network

M Schwarz, M Schwarzl, M Lipp, J Masters… - … Security–ESORICS 2019 …, 2019 - Springer
All Spectre attacks so far required local code execution. We present the first fully remote
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …

Device fingerprinting for cyber-physical systems: a survey

V Kumar, K Paul - ACM Computing Surveys, 2023 - dl.acm.org
The continued growth of the cyber-physical system (CPS) and Internet of Things
technologies raises device security and monitoring concerns. For device identification …

{GSMem}: Data exfiltration from {Air-Gapped} computers over {GSM} frequencies

M Guri, A Kachlon, O Hasson, G Kedma… - 24th USENIX Security …, 2015 - usenix.org
Air-gapped networks are isolated, separated both logically and physically from public
networks. Although the feasibility of invading such systems has been demonstrated in recent …

USBee: Air-gap covert-channel via electromagnetic emission from USB

M Guri, M Monitz, Y Elovici - 2016 14th Annual Conference on …, 2016 - ieeexplore.ieee.org
In recent years researchers have demonstrated how attackers could use USB connectors
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED

M Guri, B Zadov, Y Elovici - Detection of Intrusions and Malware, and …, 2017 - Springer
In this paper we present a method that allows attackers to covertly leak data from isolated,
air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which …

Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations

A Costin - Proceedings of the 6th international workshop on …, 2016 - dl.acm.org
Video surveillance, closed-circuit TV and IP-camera systems became virtually omnipresent
and indispensable for many organizations, businesses, and users. Their main purpose is to …

Context: A generic approach for mitigating spectre

M Schwarz, M Lipp, CA Canella… - Network and …, 2020 - graz.elsevierpure.com
Out-of-order execution and speculative execution are among the biggest contributors to
performance and efficiency of modern processors. However, they are inconsiderate, leaking …

PowerHammer: Exfiltrating data from air-gapped computers through power lines

M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …