A High-Speed, Long-Distance and Wall-Penetrating Covert Channel Based on EM Emanations from DRAM Clock
暂无分享,去创建一个
[1] Rui Tan,et al. When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[2] Jeremie S. Kim,et al. BlockHammer: Preventing RowHammer at Low Cost by Blacklisting Rapidly-Accessed DRAM Rows , 2021, 2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA).
[3] A. Bagley,et al. Anvil , 2019, Encyclopedic Dictionary of Archaeology.
[4] Mordechai Guri,et al. MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields , 2018, Future Gener. Comput. Syst..
[5] Xenofon Koutsoukos,et al. BitJabber: The World’s Fastest Electromagnetic Covert Channel , 2020, 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[6] Péter Völgyesi,et al. Leveraging EM Side-Channel Information to Detect Rowhammer Attacks , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[7] Mordechai Guri,et al. POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers , 2020, IACR Cryptol. ePrint Arch..
[8] Baki Berkay Yilmaz,et al. A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit , 2020, 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA).
[9] Mordechai Guri,et al. PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines , 2018, IEEE Transactions on Information Forensics and Security.
[10] Mordechai Guri,et al. ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields , 2018, IEEE Transactions on Information Forensics and Security.
[11] Adi Shamir,et al. Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations , 2020, IACR Cryptol. ePrint Arch..
[12] Mordechai Guri,et al. HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature , 2019, 2019 European Intelligence and Security Informatics Conference (EISIC).
[13] Mordechai Guri,et al. Brightness: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness , 2019, 2019 12th CMI Conference on Cybersecurity and Privacy (CMI).
[14] Kevin Fu,et al. Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[15] Yier Jin,et al. Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds , 2018, NDSS.
[16] Weiming Zhang,et al. Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators , 2017, ArXiv.
[17] Mordechai Guri,et al. Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration') , 2017, ESORICS.
[18] Mordechai Guri,et al. LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED , 2017, DIMVA.
[19] Diego F. Aranha,et al. Platform-agnostic Low-intrusion Optical Data Exfiltration , 2017, ICISSP.
[20] Jakub Szefer,et al. Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses , 2018, Journal of Hardware and Systems Security.
[21] Gernot Heiser,et al. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware , 2016, Journal of Cryptographic Engineering.
[22] Mordechai Guri,et al. USBee: Air-gap covert-channel via electromagnetic emission from USB , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[23] Mordechai Guri,et al. An optical covert-channel to leak data through an air-gap , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[24] Mordechai Guri,et al. Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers , 2016, ArXiv.
[25] Reetuparna Das,et al. ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks , 2016, ASPLOS.
[26] Stefan Katzenbeisser,et al. Covert channels using mobile device's magnetic field sensors , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).
[27] Stefan Mangard,et al. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks , 2015, USENIX Security Symposium.
[28] Yuan Xiao,et al. One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation , 2016, USENIX Security Symposium.
[29] Mordechai Guri,et al. GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies , 2015, USENIX Security Symposium.
[30] Aurélien Francillon,et al. C5: Cross-Cores Cache Covert Channel , 2015, DIMVA.
[31] Milos Prvulovic,et al. FASE: Finding Amplitude-modulated Side-channel Emanations , 2015, 2015 ACM/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA).
[32] Hiren D. Patel,et al. Reverse-engineering embedded memory controllers through latency-based analysis , 2015, 21st IEEE Real-Time and Embedded Technology and Applications Symposium.
[33] Mordechai Guri,et al. BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[34] Srdjan Capkun,et al. Thermal Covert Channels on Multi-core Platforms , 2015, USENIX Security Symposium.
[35] Carlisle M. Adams,et al. On Acoustic Covert Channels Between Air-Gapped Systems , 2014, FPS.
[36] Mordechai Guri,et al. AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies , 2014, 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE).
[37] Mordechai Guri,et al. Exfiltration of information from air-gapped machines using monitor's LED indicator , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.
[38] Milos Prvulovic,et al. Experimental Demonstration of Electromagnetic Information Leakage From Modern Processor-Memory Systems , 2014, IEEE Transactions on Electromagnetic Compatibility.
[39] Michael Hanspach,et al. On Covert Acoustical Mesh Networks in Air , 2014, J. Commun..
[40] Zhenyu Wu,et al. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud , 2012, USENIX Security Symposium.
[41] Matti A. Hiltunen,et al. An exploration of L2 cache covert channels in virtualized environments , 2011, CCSW '11.
[42] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[43] Ruby B. Lee,et al. Covert and Side Channels Due to Processor Architecture , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[44] David A. Umphress,et al. Information leakage from optical emanations , 2002, TSEC.
[45] T. H. Allegri. The Code of Federal Regulations , 1986 .
[46] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.