1/25/2024 0 Comments Air gapped systems![]() “ VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap.” arXiv preprint arXiv:1607.03946 (2016).There is a beauty in today’s movement toward digitalization where users can install patches, fixes and updates all online to keep systems up and running in peak efficiency with increased productivity and profitability. Mordechai Guri, Ofer Hasson, Gabi Kedma, and Yuval Elovici. “ An optical covert-channel to leak data through an air-gap.” In Privacy, Security and Trust (PST), 2016 14th Annual Conference on, pp. Mordechai Guri Boris Zadov Andrey Daidakulov Yuval EloviciĢ018 16th Annual Conference on Privacy, Security and Trust (PST) XLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs “ aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR)” Mordechai Guri, Dima Bykhovsky, Yuval Elovici “ Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers.” arXiv preprint arXiv:1606.05915 (2016). Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, and Yuval Elovici. Detection of Intrusions and Malware, and Vulnerability Assessment – 14th International Conference, DIMVA 2017: 161-184 “ LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED“. ![]() Mordechai Guri, Boris Zadov, Yuval Elovici. ![]() “ USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB.” Privacy, Security and Trust (PST), 2016 14th Annual Conference on Mordechai Guri, Matan Monitz, and Yuval Elovici. “ Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise (‘DiskFiltration’)”. European Symposium on Research in Computer Security (ESORICS 2017) pp 98-115 Mordechai Guri,Yosef Solewicz, Andrey Daidakulov, Yuval Elovici. “ GSMem: Data exfiltration from air-gapped computers over gsm frequencies.” In 24th USENIX Security Symposium (USENIX Security 15), pp. Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, and Yuval Elovici. “ Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations.” In Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, pp. Mordechai Guri, Matan Monitz, Yisroel Mirski, and Yuval Elovici. “ Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack.” ACM Transactions on Intelligent Systems and Technology (TIST) 8, no. Guri, Mordechai, Matan Monitz, and Yuval Elovici. “ AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies.” In Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on, pp. Mordechai Guri, Gabi Kedma, Assaf Kachlon, and Yuval Elovici. “ MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields“, Mordechai Guri, Andrey Daidakulov, Yuval Elovici Magnetic Fields“, Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici “ ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via “ MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication “, Mordechai Guri,Yosef Solewicz, Andrey Daidakulov, Yuval Elovici “PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines”, Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici Read our new article in the Communication of the ACM (CACM), April 2018:Ĭommunications of the ACM, Vol. Link: The Air-Gap Jumpers Presentation: BlackHat Video: īeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets (below you can find links to papers and videos)īlack Hat USA 2018: Mordechai Guri Briefing “The Air-Gap Jumpers” This page is dedicated to air-gap jumping researchīridgeware: a class of malware that allow attackers to overcome (‘bridge’) the air-gap isolation Ben-Gurion University of the Negev, Israel
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |