A taxonomy of cyber-physical threats and impact in the smart home
In the past, home automation was a small market for technology enthusiasts.
Interconnectivity between devices was down to the owner's technical skills and creativity …
Interconnectivity between devices was down to the owner's technical skills and creativity …
Whispering devices: A survey on how side-channels lead to compromised information
While operating, information processing devices or communication systems may emit
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …
USBee: Air-gap covert-channel via electromagnetic emission from USB
In recent years researchers have demonstrated how attackers could use USB connectors
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …
LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
In this paper we present a method that allows attackers to covertly leak data from isolated,
air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which …
air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which …
Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations
A Costin - Proceedings of the 6th international workshop on …, 2016 - dl.acm.org
Video surveillance, closed-circuit TV and IP-camera systems became virtually omnipresent
and indispensable for many organizations, businesses, and users. Their main purpose is to …
and indispensable for many organizations, businesses, and users. Their main purpose is to …
PowerHammer: Exfiltrating data from air-gapped computers through power lines
M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …
Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields
Air-gapped computers are devices that are kept isolated from the Internet, because they
store and process sensitive information. When highly sensitive data is involved, an air …
store and process sensitive information. When highly sensitive data is involved, an air …
Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise ('diskfiltration')
In the past, it has been shown that malware can exfiltrate data from air-gapped (isolated)
networks by transmitting ultrasonic signals via the computer's speakers. However, such a …
networks by transmitting ultrasonic signals via the computer's speakers. However, such a …
Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields
M Guri - Future Generation Computer Systems, 2021 - Elsevier
This papers shows that attackers can leak data from isolated, air-gapped computers to
nearby smartphones via covert magnetic signals. The proposed covert channel works even …
nearby smartphones via covert magnetic signals. The proposed covert channel works even …
air-jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (ir)
M Guri, D Bykhovsky - Computers & Security, 2019 - Elsevier
Breaching highly secure networks with advanced persistent threats (APTs) has been proven
feasible in the last decade, however communication between the attacker outside the …
feasible in the last decade, however communication between the attacker outside the …