Survey and systematization of secure device pairing

M Fomichev, F Alvarez, D Steinmetzer… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …

Bridgeware: The air-gap malware

M Guri, Y Elovici - Communications of the ACM, 2018 - dl.acm.org
Bridgeware: the air-gap malware Page 1 74 COMMUNICATIONS OF THE ACM | APRIL
2018 | VOL. 61 | NO. 4 review articles IMA GE B Y GRE G EPPERSON MANY …

Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations

M Guri, M Monitz, Y Mirski… - 2015 IEEE 28th Computer …, 2015 - ieeexplore.ieee.org
It has been assumed that the physical separation ('air-gap') of computers provides a reliable
level of security, such that should two adjacent computers become compromised, the covert …

S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol

D Chen, N Zhang, Z Qin, X Mao, Z Qin… - IEEE Internet of …, 2016 - ieeexplore.ieee.org
Device authentication is a critical and challenging issue for the emerging Internet of Things
(IoT). One promising solution to authenticate IoT devices is to extract a fingerprint to perform …

USBee: Air-gap covert-channel via electromagnetic emission from USB

M Guri, M Monitz, Y Elovici - 2016 14th Annual Conference on …, 2016 - ieeexplore.ieee.org
In recent years researchers have demonstrated how attackers could use USB connectors
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …

Chirp signal-based aerial acoustic communication for smart devices

H Lee, TH Kim, JW Choi, S Choi - 2015 IEEE Conference on …, 2015 - ieeexplore.ieee.org
Smart devices such as smartphones and tablet/wearable PCs are equipped with voice user
interface, ie, speaker and microphone. Accordingly, various aerial acoustic communication …

On covert acoustical mesh networks in air

M Hanspach, M Goetz - arXiv preprint arXiv:1406.1213, 2014 - arxiv.org
Covert channels can be used to circumvent system and network policies by establishing
communications that have not been considered in the design of the computing system. We …

Dhwani: secure peer-to-peer acoustic NFC

R Nandakumar, KK Chintalapudi… - ACM SIGCOMM …, 2013 - dl.acm.org
Near Field Communication (NFC) enables physically proximate devices to communicate
over very short ranges in a peer-to-peer manner without incurring complex network …

PowerHammer: Exfiltrating data from air-gapped computers through power lines

M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …

Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields

M Guri, B Zadov, Y Elovici - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Air-gapped computers are devices that are kept isolated from the Internet, because they
store and process sensitive information. When highly sensitive data is involved, an air …