Whispering devices: A survey on how side-channels lead to compromised information

C Lavaud, R Gerzaguet, M Gautier, O Berder… - Journal of Hardware and …, 2021 - Springer
While operating, information processing devices or communication systems may emit
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …

Bridgeware: The air-gap malware

M Guri, Y Elovici - Communications of the ACM, 2018 - dl.acm.org
Bridgeware: the air-gap malware Page 1 74 COMMUNICATIONS OF THE ACM | APRIL
2018 | VOL. 61 | NO. 4 review articles IMA GE B Y GRE G EPPERSON MANY …

PowerHammer: Exfiltrating data from air-gapped computers through power lines

M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …

Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields

M Guri, B Zadov, Y Elovici - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Air-gapped computers are devices that are kept isolated from the Internet, because they
store and process sensitive information. When highly sensitive data is involved, an air …

Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields

M Guri - Future Generation Computer Systems, 2021 - Elsevier
This papers shows that attackers can leak data from isolated, air-gapped computers to
nearby smartphones via covert magnetic signals. The proposed covert channel works even …

Capspeaker: Injecting voices to microphones via capacitors

X Ji, J Zhang, S Jiang, J Li, W Xu - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Voice assistants can be manipulated by various malicious voice commands, yet existing
attacks require a nearby speaker to play the attack commands. In this paper, we show that …

air-jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (ir)

M Guri, D Bykhovsky - Computers & Security, 2019 - Elsevier
Breaching highly secure networks with advanced persistent threats (APTs) has been proven
feasible in the last decade, however communication between the attacker outside the …

Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication

M Guri, Y Solewicz, Y Elovici - 2018 IEEE Conference on …, 2018 - ieeexplore.ieee.org
In this paper we show how two or more air-gapped computers in the same room, equipped
with passive speakers, headphones, or earphones can covertly exchange data via …

Hard drive of hearing: Disks that eavesdrop with a synthesized microphone

A Kwong, W Xu, K Fu - 2019 IEEE symposium on security and …, 2019 - ieeexplore.ieee.org
Security conscious individuals may take considerable measures to disable sensors in order
to protect their privacy. However, they often overlook the cyberphysical attack surface …

Brightness: Leaking sensitive data from air-gapped workstations via screen brightness

M Guri, D Bykhovsky, Y Elovici - 2019 12th CMI Conference on …, 2019 - ieeexplore.ieee.org
Air-gapped computers are systems that are kept isolated from the Internet since they store or
process sensitive information. In this paper, we introduce an optical covert channel in which …