Whispering Devices: A Survey on How Side-channels Lead to Compromised Information
暂无分享,去创建一个
Olivier Berder | Erwan Nogues | Corentin Lavaud | Matthieu Gautier | Robin Gerzaguet | Stephane Molton | R. Gerzaguet | M. Gautier | O. Berder | Erwan Nogues | Corentin Lavaud | Stéphane Molton
[1] Daniel Gruss,et al. PLATYPUS: Software-based Power Side-Channel Attacks on x86 , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[2] Kevin Fu,et al. Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems , 2020, USENIX Security Symposium.
[3] Milos Prvulovic,et al. REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals , 2020, IEEE Transactions on Computers.
[4] Yu-ichi Hayashi,et al. Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure , 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[5] Jong-Gwan Yook,et al. Information Recovery Using Electromagnetic Emanations From Display Devices Under Realistic Environment , 2019, IEEE Transactions on Electromagnetic Compatibility.
[6] Tim Güneysu,et al. Applications of machine learning techniques in side-channel attacks: a survey , 2019, Journal of Cryptographic Engineering.
[7] Mauro Conti,et al. PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos , 2019, J. Comput. Secur..
[8] Kasper Bonne Rasmussen,et al. Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses , 2019, IEEE Communications Surveys & Tutorials.
[9] Thomas P. Hayes,et al. Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers , 2018, CCS.
[10] Daniel Genkin,et al. Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[11] Nhien-An Le-Khac,et al. Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors , 2018, ARES.
[12] Jean-Pierre Seifert,et al. Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs , 2018, IACR Cryptol. ePrint Arch..
[13] Mordechai Guri,et al. xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs , 2018, 2018 16th Annual Conference on Privacy, Security and Trust (PST).
[14] A. Tisserand,et al. Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC , 2018, ICETE.
[15] Shengchang Lan,et al. Active Countermeasure Using EMI Honeypot against TEMPEST Eavesdropping in High-Speed Signalling , 2018, 2018 USNC-URSI Radio Science Meeting (Joint with AP-S Symposium).
[16] Domenic Forte,et al. Power-based Side-Channel Instruction-level Disassembler , 2018, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[17] Antonio Torralba,et al. Through-Wall Human Pose Estimation Using Radio Signals , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[18] Tao Li,et al. EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[19] Mordechai Guri,et al. BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[20] Mordechai Guri,et al. Bridgeware , 2018, Commun. ACM.
[21] Nitesh Saxena,et al. Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses , 2018, CODASPY.
[22] Mordechai Guri,et al. MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication , 2018, 2018 IEEE Conference on Dependable and Secure Computing (DSC).
[23] Mordechai Guri,et al. ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields , 2018, IEEE Transactions on Information Forensics and Security.
[24] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[25] Hongxin Zhang,et al. TEMPEST in USB , 2017, 2017 IEEE 5th International Symposium on Electromagnetic Compatibility (EMC-Beijing).
[26] Mordechai Guri,et al. Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration') , 2017, ESORICS.
[27] Hua Liu,et al. Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations , 2017, CCS.
[28] Mordechai Guri,et al. xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs , 2017, ArXiv.
[29] Nan Zhang,et al. Investigation of Unintentional Video Emanations From a VGA Connector in the Desktop Computers , 2017, IEEE Transactions on Electromagnetic Compatibility.
[30] Wei Wang,et al. Recognizing Keystrokes Using WiFi Devices , 2017, IEEE Journal on Selected Areas in Communications.
[31] Mordechai Guri,et al. LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED , 2017, DIMVA.
[32] Yu-ichi Hayashi,et al. Remote Visualization of Screen Images Using a Pseudo-Antenna That Blends Into the Mobile Environment , 2017, IEEE Transactions on Electromagnetic Compatibility.
[33] Flavia Grassi,et al. Crosstalk-Sensitive Loops and Reconstruction Algorithms to Eavesdrop Digital Signals Transmitted Along Differential Interconnects , 2017, IEEE Transactions on Electromagnetic Compatibility.
[34] Gernot Heiser,et al. Your processor leaks information — and there's nothing you can do about it , 2016, 1612.04474.
[35] Mauro Conti,et al. Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP , 2016, AsiaCCS.
[36] Mauro Conti,et al. No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices , 2016, ACNS.
[37] Mordechai Guri,et al. USBee: Air-gap covert-channel via electromagnetic emission from USB , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[38] Jong-Gwan Yook,et al. Reconstruction of leaked signal from USB keyboards , 2016, 2016 URSI Asia-Pacific Radio Science Conference (URSI AP-RASC).
[39] Stefan Katzenbeisser,et al. Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet , 2016, WISEC.
[40] Mordechai Guri,et al. VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap , 2016, ArXiv.
[41] Carlisle M. Adams,et al. A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels , 2016, IH&MMSec.
[42] Mordechai Guri,et al. Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers , 2016, ArXiv.
[43] Octavian Fratu,et al. Estimate of minimum attenuation level for a TEMPEST shielded enclosure , 2016, 2016 International Conference on Communications (COMM).
[44] Jong-Gwan Yook,et al. Measurement and analysis of the compromising electromagnetic emanations from USB keyboard , 2016, 2016 Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC).
[45] Stefan Katzenbeisser,et al. Covert channels using mobile device's magnetic field sensors , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).
[46] Daniel Genkin,et al. Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation , 2015, CHES.
[47] Shu Wang,et al. Acoustic Eavesdropping through Wireless Vibrometry , 2015, MobiCom.
[48] Barbara P. Aichinger,et al. DDR memory errors caused by Row Hammer , 2015, 2015 IEEE High Performance Extreme Computing Conference (HPEC).
[49] Mordechai Guri,et al. GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies , 2015, USENIX Security Symposium.
[50] Bo Chen,et al. Tracking Keystrokes Using Wireless Signals , 2015, MobiSys.
[51] Georg Sigl,et al. Side Channel Attacks on Smartphones and Embedded Devices Using Standard Radio Equipment , 2015, COSADE.
[52] Daniel T Sullivan,et al. Survey of Malware Threats and Recommendations to Improve Cybersecurity for Industrial Control Systems Version 1.0 , 2015 .
[53] Yu-ichi Hayashi,et al. A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation , 2014, CCS.
[54] Mordechai Guri,et al. AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies , 2014, 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE).
[55] Mordechai Guri,et al. Exfiltration of information from air-gapped machines using monitor's LED indicator , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.
[56] Kaishun Wu,et al. We Can Hear You with Wi-Fi! , 2014, IEEE Transactions on Mobile Computing.
[57] Degang Sun,et al. A novel method for computer video leaking signal detection , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).
[58] Adi Shamir,et al. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis , 2014, CRYPTO.
[59] Michael Hanspach,et al. On Covert Acoustical Mesh Networks in Air , 2014, J. Commun..
[60] Li Yongmei,et al. The study of the standards architecture and the standards attributes based on EMC standards and TEMPEST standards in computer system , 2013, 2013 8th International Conference on Computer Science & Education.
[61] Isin Erer,et al. Realistic eavesdropping attacks on computer displays with low-cost and mobile receiver system , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[62] Arnaud Tisserand,et al. $\textrm{GF}(2^m)$ Finite-Field Multipliers with Reduced Activity Variations , 2012, WAIFI.
[63] Alessandro Barenghi,et al. Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures , 2012, Proceedings of the IEEE.
[64] Benedikt Heinz,et al. Localized Electromagnetic Analysis of Cryptographic Implementations , 2012, CT-RSA.
[65] Bruno Robisson,et al. ElectroMagnetic analysis (EMA) of software AES on Java mobile phones , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[66] Tim Güneysu,et al. Generic Side-Channel Countermeasures for Reconfigurable Devices , 2011, CHES.
[67] Cliff Wang,et al. Introduction to Hardware Security and Trust , 2011 .
[68] Olivier Meynard,et al. Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques , 2011, 2011 Design, Automation & Test in Europe.
[69] Manfred Pinkal,et al. Acoustic Side-Channel Attacks on Printers , 2010, USENIX Security Symposium.
[70] Yasunao Suzuki,et al. Jamming technique to prevent information leakage caused by unintentional emissions of PC video signals , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.
[71] Patrick Schaumont,et al. State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[72] Andrei Szilagyi,et al. Shielding screen design optimization , 2010, 2010 8th International Conference on Communications.
[73] Yinghua Lu,et al. Video information recovery from EM leakage of computers based on storage oscilloscope , 2010 .
[74] Martin Vuagnoux,et al. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.
[75] Martin Welk,et al. Tempest in a Teapot: Compromising Reflections Revisited , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[76] Cécile Canovas,et al. An overview of side channel analysis attacks , 2008, ASIACCS '08.
[77] L. Toledo-Pereyra. Trust , 2006, Mediation Behaviour.
[78] Hidema Tanaka,et al. Evaluation and Improvement of the Tempest Fonts , 2004, WISA.
[79] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[80] Markus G. Kuhn,et al. Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.
[81] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[82] Miquel Roca,et al. Analysis of dissipation energy of switching digital CMOS gates with coupled outputs , 2003, Microelectron. J..
[83] Stefan Mangard,et al. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion , 2002, ICISC.
[84] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[85] David A. Umphress,et al. Information leakage from optical emanations , 2002, TSEC.
[86] Markus G. Kuhn,et al. Optical time-domain eavesdropping risks of CRT displays , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[87] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[88] P. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[89] A. Shamir,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[90] Peter Smulders,et al. The threat of information theft by reception of electromagnetic radiation from RS-232 cables , 1990, Comput. Secur..
[91] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[92] G. G. Liddle,et al. The In Thing , 1974 .
[93] Willis H. Ware,et al. Security and privacy in computer systems , 1899, AFIPS '67 (Spring).
[94] Adi Shamir,et al. Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations , 2020, IACR Cryptol. ePrint Arch..
[95] Yu-ichi Hayashi,et al. Introduction to Electromagnetic Information Security , 2019, IEICE Trans. Commun..
[96] Lejla Batina,et al. CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel , 2019, USENIX Security Symposium.
[97] Turki F. Al-Somani,et al. Review of Side Channel Attacks and Countermeasures on ECC , RSA , and AES Cryptosystems , 2018 .
[98] Milos Prvulovic,et al. One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA , 2018, USENIX Security Symposium.
[99] Shigeki Goto,et al. A Feasibility Study of Radio-frequency Retroreflector Attack , 2018, WOOT @ USENIX Security Symposium.
[100] Yang Su,et al. USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs , 2017, USENIX Security Symposium.
[101] Martin Marinov. Remote video eavesdropping using a software-defined radio platform , 2014 .
[102] Yinghua Lu,et al. Novel Method to Detect and Recover the Keystrokes of Ps/2 Keyboard , 2013 .
[103] Christof Paar,et al. Building a Side Channel Based Disassembler , 2010, Trans. Comput. Sci..
[104] Shari Lawrence Pfleeger,et al. Cybersecurity Economic Issues: Clearing the Path to Good Practice , 2008, IEEE Software.
[105] Markus G. Kuhn,et al. Eavesdropping attacks on computer displays , 2006 .
[106] Joy Laskar,et al. Modern receiver front-ends , 2004 .
[107] Eran Tromer,et al. Acoustic cryptanalysis : on nosy people and noisy machines , 2004 .
[108] Markus G. Kuhn,et al. Soft Tempest { An Opportunity for NATO , 1999 .
[109] Sue Kinn,et al. Introduction to the hardware , 1998 .
[110] Michael Backes,et al. 2008 IEEE Symposium on Security and Privacy Compromising Reflections –or– How to Read LCD Monitors Around the Corner , 2022 .