J Choi, HY Yang, DH Cho - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
This study presents a new TEMPEST threat that an attacker can surreptitiously obtain original plain audio information from a distance by exploiting recently emerging …
M Guri - IEEE Transactions on Dependable and Secure …, 2021 - ieeexplore.ieee.org
In this article, we introduce a new covert channel that enables attackers to leak data acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …
M Guri - IEEE Transactions on Dependable and Secure …, 2023 - ieeexplore.ieee.org
Air-gapped systems are isolated from the Internet due to the sensitive information they handle. This paper introduces a covert channel attack that leaks sensitive information over …
L Yang, X Chen, X Jian, L Yang, Y Li, Q Ren… - 32nd USENIX Security …, 2023 - usenix.org
Speech recognition (SR) systems are used on smart phones and speakers to make inquiries, compose emails, and initiate phone calls. However, they also impose a serious …
M Guri - 2022 19th Annual International Conference on Privacy …, 2022 - ieeexplore.ieee.org
This paper introduces a new type of attack on isolated, air-gapped workstations. Although air- gap computers have no wireless connectivity, we show that attackers can use the SATA …
Y Jiang, X Ji, J Zhang, Y Jiang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recent studies have exposed that voice assistants can be manipulated by various voice commands without being noticed, however, existing attacks require a nearby speaker to play …
Y Su, T Zhang, J Feng, Y Shi, XD Yang… - Proceedings of the CHI …, 2024 - dl.acm.org
Tagnoo is a computational plywood augmented with RFID tags, aimed at empowering woodworkers to effortlessly create room-scale smart environments. Unlike existing solutions …
G Camurati, A Francillon - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
Electronic devices generate electromagnetic noise, also known as EM leakage when the noise leaks information. Many recent research papers exploit the fact that software activity …
M Guri - arXiv preprint arXiv:2212.03520, 2022 - arxiv.org
Air-gapped systems are isolated from the Internet due to the sensitive information they handle. This paper presents COVID-bit, a new COVert channel attack that leaks sensitive …