USBee: Air-gap covert-channel via electromagnetic emission from USB
In recent years researchers have demonstrated how attackers could use USB connectors
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …
LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
In this paper we present a method that allows attackers to covertly leak data from isolated,
air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which …
air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which …
A survey on air-gap attacks: Fundamentals, transport means, attack scenarios and challenges
J Park, J Yoo, J Yu, J Lee, JS Song - Sensors, 2023 - mdpi.com
Major public institutions and organizations that handle sensitive data frequently enforce
strong security policies by implementing network separation policies that segregates their …
strong security policies by implementing network separation policies that segregates their …
An optical covert-channel to leak data through an air-gap
M Guri, O Hasson, G Kedma… - 2016 14th Annual …, 2016 - ieeexplore.ieee.org
In recent years, various out-of-band covert channels have been proposed that demonstrate
the feasibility of leaking data out of computers without the need for network connectivity. The …
the feasibility of leaking data out of computers without the need for network connectivity. The …
Blue note: How intentional acoustic interference damages availability and integrity in hard disk drives and operating systems
Intentional acoustic interference causes unusual errors in the mechanics of magnetic hard
disk drives in desktop and laptop computers, leading to damage to integrity and availability …
disk drives in desktop and laptop computers, leading to damage to integrity and availability …
Spiralspy: Exploring a stealthy and practical covert channel to attack air-gapped computing devices via mmwave sensing
Covert channels are a method of communication that is used to exfiltrate information from
computing devices and break the security policy of computer systems. Any shared resource …
computing devices and break the security policy of computer systems. Any shared resource …
xled: Covert data exfiltration from air-gapped networks via router leds
In this paper we show how attackers can covertly leak data (eg, encryption keys, passwords
and files) from highly secure or air-gapped networks via the row of status LEDs that exists in …
and files) from highly secure or air-gapped networks via the row of status LEDs that exists in …
[PDF][PDF] Platform-agnostic Low-intrusion Optical Data Exfiltration.
AC Lopes, DF Aranha - ICISSP, 2017 - scitepress.org
Information leakage through covert channels is a growing and persistent threat, even for
physical perimeters considered as highly secure. We study a new approach for data …
physical perimeters considered as highly secure. We study a new approach for data …
Off-the-shelf embedded devices as platforms for security research
With increasing concerns about the security and trustworthiness of embedded devices, the
importance of research on their firmware is growing. Unfortunately, researchers with new …
importance of research on their firmware is growing. Unfortunately, researchers with new …
[图书][B] Large-scale integration of heterogeneous simulations
H Neema - 2018 - search.proquest.com
Abstract Large System-of-Systems (SoSs) are composed of several independent existing
systems. The successful operation of these systems involve not only each independent …
systems. The successful operation of these systems involve not only each independent …