Whispering devices: A survey on how side-channels lead to compromised information

C Lavaud, R Gerzaguet, M Gautier, O Berder… - Journal of Hardware and …, 2021 - Springer
While operating, information processing devices or communication systems may emit
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …

PowerHammer: Exfiltrating data from air-gapped computers through power lines

M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …

A survey on air-gap attacks: Fundamentals, transport means, attack scenarios and challenges

J Park, J Yoo, J Yu, J Lee, JS Song - Sensors, 2023 - mdpi.com
Major public institutions and organizations that handle sensitive data frequently enforce
strong security policies by implementing network separation policies that segregates their …

Capspeaker: Injecting voices to microphones via capacitors

X Ji, J Zhang, S Jiang, J Li, W Xu - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Voice assistants can be manipulated by various malicious voice commands, yet existing
attacks require a nearby speaker to play the attack commands. In this paper, we show that …

air-jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (ir)

M Guri, D Bykhovsky - Computers & Security, 2019 - Elsevier
Breaching highly secure networks with advanced persistent threats (APTs) has been proven
feasible in the last decade, however communication between the attacker outside the …

Fansmitter: Acoustic data exfiltration from air-gapped computers via fans noise

M Guri, Y Solewicz, Y Elovici - Computers & Security, 2020 - Elsevier
Computers that contain sensitive information are often maintained in air-gapped isolation. In
this defensive measure, a computer is disconnected from the Internet-logically and …

Beatcoin: Leaking private keys from air-gapped cryptocurrency wallets

M Guri - 2018 IEEE International Conference on Internet of …, 2018 - ieeexplore.ieee.org
Cryptocurrency wallets store the wallet's private key (s), and hence, are a lucrative target for
attackers. With possession of the private key, an attacker virtually owns all of the currency in …

Ctrl-alt-led: Leaking data from air-gapped computers via keyboard leds

M Guri, B Zadov, D Bykhovsky… - 2019 IEEE 43rd Annual …, 2019 - ieeexplore.ieee.org
Using the keyboard LEDs to send data optically was proposed in 2002 by Loughry and
Umphress [1](Appendix A). In this paper we extensively explore this threat in the context of a …

xled: Covert data exfiltration from air-gapped networks via switch and router leds

M Guri, B Zadov, A Daidakulov… - 2018 16th Annual …, 2018 - ieeexplore.ieee.org
An air-gapped network is a type of IT network that is separated from the Internet-physically–
due to the sensitive information it stores. Even if such a network is compromised with a …

POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers

M Guri - IEEE Transactions on Dependable and Secure …, 2021 - ieeexplore.ieee.org
In this article, we introduce a new covert channel that enables attackers to leak data
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …