When LoRa meets EMR: Electromagnetic covert channels can be super resilient

C Shen, T Liu, J Huang, R Tan - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Due to the low power of electromagnetic radiation (EMR), EM convert channel has been
widely considered as a short-range attack that can be easily mitigated by shielding. This …

Covert channel communication as an emerging security threat in 2.5 d/3d integrated systems

I Miketic, K Dhananjay, E Salman - Sensors, 2023 - mdpi.com
In this paper, first, a broad overview of existing covert channel communication-based
security attacks is provided. Such covert channels establish a communication link between …

Graphics pee** unit: Exploiting em side-channel information of gpus to eavesdrop on your neighbors

Z Zhan, Z Zhang, S Liang, F Yao… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
As the popularity of graphics processing units (GPUs) grows rapidly in recent years, it
becomes very critical to study and understand the security implications imposed by them. In …

Air-fi: Leaking data from air-gapped computers using wi-fi frequencies

M Guri - IEEE Transactions on Dependable and Secure …, 2022 - ieeexplore.ieee.org
This article presents a new attack allowing attackers to exfiltrate data from isolated, air-
gapped computers via Wi-Fi frequencies. We show that malware in a compromised air …

POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers

M Guri - IEEE Transactions on Dependable and Secure …, 2021 - ieeexplore.ieee.org
In this article, we introduce a new covert channel that enables attackers to leak data
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …

Air-gap electromagnetic covert channel

M Guri - IEEE Transactions on Dependable and Secure …, 2023 - ieeexplore.ieee.org
Air-gapped systems are isolated from the Internet due to the sensitive information they
handle. This paper introduces a covert channel attack that leaks sensitive information over …

Red alert for power leakage: Exploiting intel rapl-induced side channels

Z Zhang, S Liang, F Yao, X Gao - Proceedings of the 2021 ACM Asia …, 2021 - dl.acm.org
RAPL (Running Average Power Limit) is a hardware feature introduced by Intel to facilitate
power management. Even though RAPL and its supporting software interfaces can benefit …

Clairvoyance: exploiting far-field em emanations of gpu to" see" your dnn models through obstacles at a distance

S Liang, Z Zhan, F Yao, L Cheng… - 2022 IEEE Security and …, 2022 - ieeexplore.ieee.org
Deep neural networks (DNNs) are becoming increasingly popular in real-world applications,
and they are considered valuable assets of enterprises. In recent years, a number of model …

SATAn: Air-gap exfiltration attack via radio signals from SATA cables

M Guri - 2022 19th Annual International Conference on Privacy …, 2022 - ieeexplore.ieee.org
This paper introduces a new type of attack on isolated, air-gapped workstations. Although air-
gap computers have no wireless connectivity, we show that attackers can use the SATA …

Noise-sdr: Arbitrary modulation of electromagnetic noise from unprivileged software and its impact on emission security

G Camurati, A Francillon - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
Electronic devices generate electromagnetic noise, also known as EM leakage when the
noise leaks information. Many recent research papers exploit the fact that software activity …