Whispering devices: A survey on how side-channels lead to compromised information
While operating, information processing devices or communication systems may emit
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …
PowerHammer: Exfiltrating data from air-gapped computers through power lines
M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …
Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields
Air-gapped computers are devices that are kept isolated from the Internet, because they
store and process sensitive information. When highly sensitive data is involved, an air …
store and process sensitive information. When highly sensitive data is involved, an air …
Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields
M Guri - Future Generation Computer Systems, 2021 - Elsevier
This papers shows that attackers can leak data from isolated, air-gapped computers to
nearby smartphones via covert magnetic signals. The proposed covert channel works even …
nearby smartphones via covert magnetic signals. The proposed covert channel works even …
Capspeaker: Injecting voices to microphones via capacitors
Voice assistants can be manipulated by various malicious voice commands, yet existing
attacks require a nearby speaker to play the attack commands. In this paper, we show that …
attacks require a nearby speaker to play the attack commands. In this paper, we show that …
air-jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (ir)
M Guri, D Bykhovsky - Computers & Security, 2019 - Elsevier
Breaching highly secure networks with advanced persistent threats (APTs) has been proven
feasible in the last decade, however communication between the attacker outside the …
feasible in the last decade, however communication between the attacker outside the …
Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication
In this paper we show how two or more air-gapped computers in the same room, equipped
with passive speakers, headphones, or earphones can covertly exchange data via …
with passive speakers, headphones, or earphones can covertly exchange data via …
Hard drive of hearing: Disks that eavesdrop with a synthesized microphone
Security conscious individuals may take considerable measures to disable sensors in order
to protect their privacy. However, they often overlook the cyberphysical attack surface …
to protect their privacy. However, they often overlook the cyberphysical attack surface …
Brightness: Leaking sensitive data from air-gapped workstations via screen brightness
Air-gapped computers are systems that are kept isolated from the Internet since they store or
process sensitive information. In this paper, we introduce an optical covert channel in which …
process sensitive information. In this paper, we introduce an optical covert channel in which …