USBee: Air-gap covert-channel via electromagnetic emission from USB

M Guri, M Monitz, Y Elovici - 2016 14th Annual Conference on …, 2016 - ieeexplore.ieee.org
In recent years researchers have demonstrated how attackers could use USB connectors
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED

M Guri, B Zadov, Y Elovici - Detection of Intrusions and Malware, and …, 2017 - Springer
In this paper we present a method that allows attackers to covertly leak data from isolated,
air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which …

A survey on air-gap attacks: Fundamentals, transport means, attack scenarios and challenges

J Park, J Yoo, J Yu, J Lee, JS Song - Sensors, 2023 - mdpi.com
Major public institutions and organizations that handle sensitive data frequently enforce
strong security policies by implementing network separation policies that segregates their …

An optical covert-channel to leak data through an air-gap

M Guri, O Hasson, G Kedma… - 2016 14th Annual …, 2016 - ieeexplore.ieee.org
In recent years, various out-of-band covert channels have been proposed that demonstrate
the feasibility of leaking data out of computers without the need for network connectivity. The …

Blue note: How intentional acoustic interference damages availability and integrity in hard disk drives and operating systems

C Bolton, S Rampazzi, C Li, A Kwong… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Intentional acoustic interference causes unusual errors in the mechanics of magnetic hard
disk drives in desktop and laptop computers, leading to damage to integrity and availability …

Spiralspy: Exploring a stealthy and practical covert channel to attack air-gapped computing devices via mmwave sensing

Z Li, B Chen, X Chen, H Li, C Xu, F Lin… - The 29th Network …, 2022 - research.ed.ac.uk
Covert channels are a method of communication that is used to exfiltrate information from
computing devices and break the security policy of computer systems. Any shared resource …

xled: Covert data exfiltration from air-gapped networks via router leds

M Guri, B Zadov, A Daidakulov, Y Elovici - arXiv preprint arXiv:1706.01140, 2017 - arxiv.org
In this paper we show how attackers can covertly leak data (eg, encryption keys, passwords
and files) from highly secure or air-gapped networks via the row of status LEDs that exists in …

[PDF][PDF] Platform-agnostic Low-intrusion Optical Data Exfiltration.

AC Lopes, DF Aranha - ICISSP, 2017 - scitepress.org
Information leakage through covert channels is a growing and persistent threat, even for
physical perimeters considered as highly secure. We study a new approach for data …

Off-the-shelf embedded devices as platforms for security research

L Cojocar, K Razavi, H Bos - … of the 10th European Workshop on …, 2017 - dl.acm.org
With increasing concerns about the security and trustworthiness of embedded devices, the
importance of research on their firmware is growing. Unfortunately, researchers with new …

[图书][B] Large-scale integration of heterogeneous simulations

H Neema - 2018 - search.proquest.com
Abstract Large System-of-Systems (SoSs) are composed of several independent existing
systems. The successful operation of these systems involve not only each independent …