A taxonomy of cyber-physical threats and impact in the smart home

R Heartfield, G Loukas, S Budimir, A Bezemskij… - Computers & …, 2018 - Elsevier
In the past, home automation was a small market for technology enthusiasts.
Interconnectivity between devices was down to the owner's technical skills and creativity …

Whispering devices: A survey on how side-channels lead to compromised information

C Lavaud, R Gerzaguet, M Gautier, O Berder… - Journal of Hardware and …, 2021 - Springer
While operating, information processing devices or communication systems may emit
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …

USBee: Air-gap covert-channel via electromagnetic emission from USB

M Guri, M Monitz, Y Elovici - 2016 14th Annual Conference on …, 2016 - ieeexplore.ieee.org
In recent years researchers have demonstrated how attackers could use USB connectors
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED

M Guri, B Zadov, Y Elovici - Detection of Intrusions and Malware, and …, 2017 - Springer
In this paper we present a method that allows attackers to covertly leak data from isolated,
air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which …

Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations

A Costin - Proceedings of the 6th international workshop on …, 2016 - dl.acm.org
Video surveillance, closed-circuit TV and IP-camera systems became virtually omnipresent
and indispensable for many organizations, businesses, and users. Their main purpose is to …

PowerHammer: Exfiltrating data from air-gapped computers through power lines

M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …

Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields

M Guri, B Zadov, Y Elovici - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Air-gapped computers are devices that are kept isolated from the Internet, because they
store and process sensitive information. When highly sensitive data is involved, an air …

Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise ('diskfiltration')

M Guri, Y Solewicz, A Daidakulov, Y Elovici - … Security–ESORICS 2017 …, 2017 - Springer
In the past, it has been shown that malware can exfiltrate data from air-gapped (isolated)
networks by transmitting ultrasonic signals via the computer's speakers. However, such a …

Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields

M Guri - Future Generation Computer Systems, 2021 - Elsevier
This papers shows that attackers can leak data from isolated, air-gapped computers to
nearby smartphones via covert magnetic signals. The proposed covert channel works even …

air-jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (ir)

M Guri, D Bykhovsky - Computers & Security, 2019 - Elsevier
Breaching highly secure networks with advanced persistent threats (APTs) has been proven
feasible in the last decade, however communication between the attacker outside the …