It has been assumed that the physical separation ('air-gap') of computers provides a reliable level of security, such that should two adjacent computers become compromised, the covert …
Device authentication is a critical and challenging issue for the emerging Internet of Things (IoT). One promising solution to authenticate IoT devices is to extract a fingerprint to perform …
In recent years researchers have demonstrated how attackers could use USB connectors implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …
H Lee, TH Kim, JW Choi, S Choi - 2015 IEEE Conference on …, 2015 - ieeexplore.ieee.org
Smart devices such as smartphones and tablet/wearable PCs are equipped with voice user interface, ie, speaker and microphone. Accordingly, various aerial acoustic communication …
M Hanspach, M Goetz - arXiv preprint arXiv:1406.1213, 2014 - arxiv.org
Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. We …
Near Field Communication (NFC) enables physically proximate devices to communicate over very short ranges in a peer-to-peer manner without incurring complex network …
M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …
M Guri, B Zadov, Y Elovici - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Air-gapped computers are devices that are kept isolated from the Internet, because they store and process sensitive information. When highly sensitive data is involved, an air …