A High-Speed, Long-Distance and Wall-Penetrating Covert Channel Based on EM Emanations from DRAM Clock

[1]  Rui Tan,et al.  When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient , 2021, 2021 IEEE Symposium on Security and Privacy (SP).

[2]  Jeremie S. Kim,et al.  BlockHammer: Preventing RowHammer at Low Cost by Blacklisting Rapidly-Accessed DRAM Rows , 2021, 2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA).

[3]  A. Bagley,et al.  Anvil , 2019, Encyclopedic Dictionary of Archaeology.

[4]  Mordechai Guri,et al.  MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields , 2018, Future Gener. Comput. Syst..

[5]  Xenofon Koutsoukos,et al.  BitJabber: The World’s Fastest Electromagnetic Covert Channel , 2020, 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[6]  Péter Völgyesi,et al.  Leveraging EM Side-Channel Information to Detect Rowhammer Attacks , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[7]  Mordechai Guri,et al.  POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers , 2020, IACR Cryptol. ePrint Arch..

[8]  Baki Berkay Yilmaz,et al.  A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit , 2020, 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA).

[9]  Mordechai Guri,et al.  PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines , 2018, IEEE Transactions on Information Forensics and Security.

[10]  Mordechai Guri,et al.  ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields , 2018, IEEE Transactions on Information Forensics and Security.

[11]  Adi Shamir,et al.  Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations , 2020, IACR Cryptol. ePrint Arch..

[12]  Mordechai Guri,et al.  HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature , 2019, 2019 European Intelligence and Security Informatics Conference (EISIC).

[13]  Mordechai Guri,et al.  Brightness: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness , 2019, 2019 12th CMI Conference on Cybersecurity and Privacy (CMI).

[14]  Kevin Fu,et al.  Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[15]  Yier Jin,et al.  Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds , 2018, NDSS.

[16]  Weiming Zhang,et al.  Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators , 2017, ArXiv.

[17]  Mordechai Guri,et al.  Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration') , 2017, ESORICS.

[18]  Mordechai Guri,et al.  LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED , 2017, DIMVA.

[19]  Diego F. Aranha,et al.  Platform-agnostic Low-intrusion Optical Data Exfiltration , 2017, ICISSP.

[20]  Jakub Szefer,et al.  Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses , 2018, Journal of Hardware and Systems Security.

[21]  Gernot Heiser,et al.  A survey of microarchitectural timing attacks and countermeasures on contemporary hardware , 2016, Journal of Cryptographic Engineering.

[22]  Mordechai Guri,et al.  USBee: Air-gap covert-channel via electromagnetic emission from USB , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[23]  Mordechai Guri,et al.  An optical covert-channel to leak data through an air-gap , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[24]  Mordechai Guri,et al.  Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers , 2016, ArXiv.

[25]  Reetuparna Das,et al.  ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks , 2016, ASPLOS.

[26]  Stefan Katzenbeisser,et al.  Covert channels using mobile device's magnetic field sensors , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).

[27]  Stefan Mangard,et al.  DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks , 2015, USENIX Security Symposium.

[28]  Yuan Xiao,et al.  One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation , 2016, USENIX Security Symposium.

[29]  Mordechai Guri,et al.  GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies , 2015, USENIX Security Symposium.

[30]  Aurélien Francillon,et al.  C5: Cross-Cores Cache Covert Channel , 2015, DIMVA.

[31]  Milos Prvulovic,et al.  FASE: Finding Amplitude-modulated Side-channel Emanations , 2015, 2015 ACM/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA).

[32]  Hiren D. Patel,et al.  Reverse-engineering embedded memory controllers through latency-based analysis , 2015, 21st IEEE Real-Time and Embedded Technology and Applications Symposium.

[33]  Mordechai Guri,et al.  BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.

[34]  Srdjan Capkun,et al.  Thermal Covert Channels on Multi-core Platforms , 2015, USENIX Security Symposium.

[35]  Carlisle M. Adams,et al.  On Acoustic Covert Channels Between Air-Gapped Systems , 2014, FPS.

[36]  Mordechai Guri,et al.  AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies , 2014, 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE).

[37]  Mordechai Guri,et al.  Exfiltration of information from air-gapped machines using monitor's LED indicator , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[38]  Milos Prvulovic,et al.  Experimental Demonstration of Electromagnetic Information Leakage From Modern Processor-Memory Systems , 2014, IEEE Transactions on Electromagnetic Compatibility.

[39]  Michael Hanspach,et al.  On Covert Acoustical Mesh Networks in Air , 2014, J. Commun..

[40]  Zhenyu Wu,et al.  Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud , 2012, USENIX Security Symposium.

[41]  Matti A. Hiltunen,et al.  An exploration of L2 cache covert channels in virtualized environments , 2011, CCSW '11.

[42]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[43]  Ruby B. Lee,et al.  Covert and Side Channels Due to Processor Architecture , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[44]  David A. Umphress,et al.  Information leakage from optical emanations , 2002, TSEC.

[45]  T. H. Allegri The Code of Federal Regulations , 1986 .

[46]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.