The security in optical wireless communication: A survey
With the demand for economical and high-speed wireless services, Optical Wireless
Communication (OWC) has attracted increasing attention in both research and the market. In …
Communication (OWC) has attracted increasing attention in both research and the market. In …
Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures
A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023 - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by
developing advanced cyber weapons. They have equipped with the most advanced …
developing advanced cyber weapons. They have equipped with the most advanced …
Netspectre: Read arbitrary memory over network
All Spectre attacks so far required local code execution. We present the first fully remote
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …
Device fingerprinting for cyber-physical systems: a survey
The continued growth of the cyber-physical system (CPS) and Internet of Things
technologies raises device security and monitoring concerns. For device identification …
technologies raises device security and monitoring concerns. For device identification …
{GSMem}: Data exfiltration from {Air-Gapped} computers over {GSM} frequencies
M Guri, A Kachlon, O Hasson, G Kedma… - 24th USENIX Security …, 2015 - usenix.org
Air-gapped networks are isolated, separated both logically and physically from public
networks. Although the feasibility of invading such systems has been demonstrated in recent …
networks. Although the feasibility of invading such systems has been demonstrated in recent …
USBee: Air-gap covert-channel via electromagnetic emission from USB
In recent years researchers have demonstrated how attackers could use USB connectors
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …
LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
In this paper we present a method that allows attackers to covertly leak data from isolated,
air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which …
air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which …
Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations
A Costin - Proceedings of the 6th international workshop on …, 2016 - dl.acm.org
Video surveillance, closed-circuit TV and IP-camera systems became virtually omnipresent
and indispensable for many organizations, businesses, and users. Their main purpose is to …
and indispensable for many organizations, businesses, and users. Their main purpose is to …
Context: A generic approach for mitigating spectre
Out-of-order execution and speculative execution are among the biggest contributors to
performance and efficiency of modern processors. However, they are inconsiderate, leaking …
performance and efficiency of modern processors. However, they are inconsiderate, leaking …
PowerHammer: Exfiltrating data from air-gapped computers through power lines
M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …