Whispering devices: A survey on how side-channels lead to compromised information
While operating, information processing devices or communication systems may emit
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …
PowerHammer: Exfiltrating data from air-gapped computers through power lines
M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …
A survey on air-gap attacks: Fundamentals, transport means, attack scenarios and challenges
J Park, J Yoo, J Yu, J Lee, JS Song - Sensors, 2023 - mdpi.com
Major public institutions and organizations that handle sensitive data frequently enforce
strong security policies by implementing network separation policies that segregates their …
strong security policies by implementing network separation policies that segregates their …
Capspeaker: Injecting voices to microphones via capacitors
Voice assistants can be manipulated by various malicious voice commands, yet existing
attacks require a nearby speaker to play the attack commands. In this paper, we show that …
attacks require a nearby speaker to play the attack commands. In this paper, we show that …
air-jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (ir)
M Guri, D Bykhovsky - Computers & Security, 2019 - Elsevier
Breaching highly secure networks with advanced persistent threats (APTs) has been proven
feasible in the last decade, however communication between the attacker outside the …
feasible in the last decade, however communication between the attacker outside the …
Fansmitter: Acoustic data exfiltration from air-gapped computers via fans noise
Computers that contain sensitive information are often maintained in air-gapped isolation. In
this defensive measure, a computer is disconnected from the Internet-logically and …
this defensive measure, a computer is disconnected from the Internet-logically and …
Beatcoin: Leaking private keys from air-gapped cryptocurrency wallets
M Guri - 2018 IEEE International Conference on Internet of …, 2018 - ieeexplore.ieee.org
Cryptocurrency wallets store the wallet's private key (s), and hence, are a lucrative target for
attackers. With possession of the private key, an attacker virtually owns all of the currency in …
attackers. With possession of the private key, an attacker virtually owns all of the currency in …
Ctrl-alt-led: Leaking data from air-gapped computers via keyboard leds
M Guri, B Zadov, D Bykhovsky… - 2019 IEEE 43rd Annual …, 2019 - ieeexplore.ieee.org
Using the keyboard LEDs to send data optically was proposed in 2002 by Loughry and
Umphress [1](Appendix A). In this paper we extensively explore this threat in the context of a …
Umphress [1](Appendix A). In this paper we extensively explore this threat in the context of a …
xled: Covert data exfiltration from air-gapped networks via switch and router leds
M Guri, B Zadov, A Daidakulov… - 2018 16th Annual …, 2018 - ieeexplore.ieee.org
An air-gapped network is a type of IT network that is separated from the Internet-physically–
due to the sensitive information it stores. Even if such a network is compromised with a …
due to the sensitive information it stores. Even if such a network is compromised with a …
POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers
M Guri - IEEE Transactions on Dependable and Secure …, 2021 - ieeexplore.ieee.org
In this article, we introduce a new covert channel that enables attackers to leak data
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …