When LoRa meets EMR: Electromagnetic covert channels can be super resilient
Due to the low power of electromagnetic radiation (EMR), EM convert channel has been
widely considered as a short-range attack that can be easily mitigated by shielding. This …
widely considered as a short-range attack that can be easily mitigated by shielding. This …
Covert channel communication as an emerging security threat in 2.5 d/3d integrated systems
In this paper, first, a broad overview of existing covert channel communication-based
security attacks is provided. Such covert channels establish a communication link between …
security attacks is provided. Such covert channels establish a communication link between …
Graphics pee** unit: Exploiting em side-channel information of gpus to eavesdrop on your neighbors
As the popularity of graphics processing units (GPUs) grows rapidly in recent years, it
becomes very critical to study and understand the security implications imposed by them. In …
becomes very critical to study and understand the security implications imposed by them. In …
Air-fi: Leaking data from air-gapped computers using wi-fi frequencies
M Guri - IEEE Transactions on Dependable and Secure …, 2022 - ieeexplore.ieee.org
This article presents a new attack allowing attackers to exfiltrate data from isolated, air-
gapped computers via Wi-Fi frequencies. We show that malware in a compromised air …
gapped computers via Wi-Fi frequencies. We show that malware in a compromised air …
POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers
M Guri - IEEE Transactions on Dependable and Secure …, 2021 - ieeexplore.ieee.org
In this article, we introduce a new covert channel that enables attackers to leak data
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …
Air-gap electromagnetic covert channel
M Guri - IEEE Transactions on Dependable and Secure …, 2023 - ieeexplore.ieee.org
Air-gapped systems are isolated from the Internet due to the sensitive information they
handle. This paper introduces a covert channel attack that leaks sensitive information over …
handle. This paper introduces a covert channel attack that leaks sensitive information over …
Red alert for power leakage: Exploiting intel rapl-induced side channels
RAPL (Running Average Power Limit) is a hardware feature introduced by Intel to facilitate
power management. Even though RAPL and its supporting software interfaces can benefit …
power management. Even though RAPL and its supporting software interfaces can benefit …
Clairvoyance: exploiting far-field em emanations of gpu to" see" your dnn models through obstacles at a distance
Deep neural networks (DNNs) are becoming increasingly popular in real-world applications,
and they are considered valuable assets of enterprises. In recent years, a number of model …
and they are considered valuable assets of enterprises. In recent years, a number of model …
SATAn: Air-gap exfiltration attack via radio signals from SATA cables
M Guri - 2022 19th Annual International Conference on Privacy …, 2022 - ieeexplore.ieee.org
This paper introduces a new type of attack on isolated, air-gapped workstations. Although air-
gap computers have no wireless connectivity, we show that attackers can use the SATA …
gap computers have no wireless connectivity, we show that attackers can use the SATA …
Noise-sdr: Arbitrary modulation of electromagnetic noise from unprivileged software and its impact on emission security
Electronic devices generate electromagnetic noise, also known as EM leakage when the
noise leaks information. Many recent research papers exploit the fact that software activity …
noise leaks information. Many recent research papers exploit the fact that software activity …