Whispering Devices: A Survey on How Side-channels Lead to Compromised Information

[1]  Daniel Gruss,et al.  PLATYPUS: Software-based Power Side-Channel Attacks on x86 , 2021, 2021 IEEE Symposium on Security and Privacy (SP).

[2]  Kevin Fu,et al.  Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems , 2020, USENIX Security Symposium.

[3]  Milos Prvulovic,et al.  REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals , 2020, IEEE Transactions on Computers.

[4]  Yu-ichi Hayashi,et al.  Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure , 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[5]  Jong-Gwan Yook,et al.  Information Recovery Using Electromagnetic Emanations From Display Devices Under Realistic Environment , 2019, IEEE Transactions on Electromagnetic Compatibility.

[6]  Tim Güneysu,et al.  Applications of machine learning techniques in side-channel attacks: a survey , 2019, Journal of Cryptographic Engineering.

[7]  Mauro Conti,et al.  PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos , 2019, J. Comput. Secur..

[8]  Kasper Bonne Rasmussen,et al.  Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses , 2019, IEEE Communications Surveys & Tutorials.

[9]  Thomas P. Hayes,et al.  Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers , 2018, CCS.

[10]  Daniel Genkin,et al.  Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels , 2018, 2019 IEEE Symposium on Security and Privacy (SP).

[11]  Nhien-An Le-Khac,et al.  Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors , 2018, ARES.

[12]  Jean-Pierre Seifert,et al.  Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs , 2018, IACR Cryptol. ePrint Arch..

[13]  Mordechai Guri,et al.  xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs , 2018, 2018 16th Annual Conference on Privacy, Security and Trust (PST).

[14]  A. Tisserand,et al.  Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC , 2018, ICETE.

[15]  Shengchang Lan,et al.  Active Countermeasure Using EMI Honeypot against TEMPEST Eavesdropping in High-Speed Signalling , 2018, 2018 USNC-URSI Radio Science Meeting (Joint with AP-S Symposium).

[16]  Domenic Forte,et al.  Power-based Side-Channel Instruction-level Disassembler , 2018, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).

[17]  Antonio Torralba,et al.  Through-Wall Human Pose Estimation Using Radio Signals , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[18]  Tao Li,et al.  EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[19]  Mordechai Guri,et al.  BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[20]  Mordechai Guri,et al.  Bridgeware , 2018, Commun. ACM.

[21]  Nitesh Saxena,et al.  Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses , 2018, CODASPY.

[22]  Mordechai Guri,et al.  MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication , 2018, 2018 IEEE Conference on Dependable and Secure Computing (DSC).

[23]  Mordechai Guri,et al.  ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields , 2018, IEEE Transactions on Information Forensics and Security.

[24]  Michael Hamburg,et al.  Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).

[25]  Hongxin Zhang,et al.  TEMPEST in USB , 2017, 2017 IEEE 5th International Symposium on Electromagnetic Compatibility (EMC-Beijing).

[26]  Mordechai Guri,et al.  Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration') , 2017, ESORICS.

[27]  Hua Liu,et al.  Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations , 2017, CCS.

[28]  Mordechai Guri,et al.  xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs , 2017, ArXiv.

[29]  Nan Zhang,et al.  Investigation of Unintentional Video Emanations From a VGA Connector in the Desktop Computers , 2017, IEEE Transactions on Electromagnetic Compatibility.

[30]  Wei Wang,et al.  Recognizing Keystrokes Using WiFi Devices , 2017, IEEE Journal on Selected Areas in Communications.

[31]  Mordechai Guri,et al.  LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED , 2017, DIMVA.

[32]  Yu-ichi Hayashi,et al.  Remote Visualization of Screen Images Using a Pseudo-Antenna That Blends Into the Mobile Environment , 2017, IEEE Transactions on Electromagnetic Compatibility.

[33]  Flavia Grassi,et al.  Crosstalk-Sensitive Loops and Reconstruction Algorithms to Eavesdrop Digital Signals Transmitted Along Differential Interconnects , 2017, IEEE Transactions on Electromagnetic Compatibility.

[34]  Gernot Heiser,et al.  Your processor leaks information — and there's nothing you can do about it , 2016, 1612.04474.

[35]  Mauro Conti,et al.  Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP , 2016, AsiaCCS.

[36]  Mauro Conti,et al.  No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices , 2016, ACNS.

[37]  Mordechai Guri,et al.  USBee: Air-gap covert-channel via electromagnetic emission from USB , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[38]  Jong-Gwan Yook,et al.  Reconstruction of leaked signal from USB keyboards , 2016, 2016 URSI Asia-Pacific Radio Science Conference (URSI AP-RASC).

[39]  Stefan Katzenbeisser,et al.  Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet , 2016, WISEC.

[40]  Mordechai Guri,et al.  VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap , 2016, ArXiv.

[41]  Carlisle M. Adams,et al.  A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels , 2016, IH&MMSec.

[42]  Mordechai Guri,et al.  Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers , 2016, ArXiv.

[43]  Octavian Fratu,et al.  Estimate of minimum attenuation level for a TEMPEST shielded enclosure , 2016, 2016 International Conference on Communications (COMM).

[44]  Jong-Gwan Yook,et al.  Measurement and analysis of the compromising electromagnetic emanations from USB keyboard , 2016, 2016 Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC).

[45]  Stefan Katzenbeisser,et al.  Covert channels using mobile device's magnetic field sensors , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).

[46]  Daniel Genkin,et al.  Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation , 2015, CHES.

[47]  Shu Wang,et al.  Acoustic Eavesdropping through Wireless Vibrometry , 2015, MobiCom.

[48]  Barbara P. Aichinger,et al.  DDR memory errors caused by Row Hammer , 2015, 2015 IEEE High Performance Extreme Computing Conference (HPEC).

[49]  Mordechai Guri,et al.  GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies , 2015, USENIX Security Symposium.

[50]  Bo Chen,et al.  Tracking Keystrokes Using Wireless Signals , 2015, MobiSys.

[51]  Georg Sigl,et al.  Side Channel Attacks on Smartphones and Embedded Devices Using Standard Radio Equipment , 2015, COSADE.

[52]  Daniel T Sullivan,et al.  Survey of Malware Threats and Recommendations to Improve Cybersecurity for Industrial Control Systems Version 1.0 , 2015 .

[53]  Yu-ichi Hayashi,et al.  A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation , 2014, CCS.

[54]  Mordechai Guri,et al.  AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies , 2014, 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE).

[55]  Mordechai Guri,et al.  Exfiltration of information from air-gapped machines using monitor's LED indicator , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[56]  Kaishun Wu,et al.  We Can Hear You with Wi-Fi! , 2014, IEEE Transactions on Mobile Computing.

[57]  Degang Sun,et al.  A novel method for computer video leaking signal detection , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).

[58]  Adi Shamir,et al.  RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis , 2014, CRYPTO.

[59]  Michael Hanspach,et al.  On Covert Acoustical Mesh Networks in Air , 2014, J. Commun..

[60]  Li Yongmei,et al.  The study of the standards architecture and the standards attributes based on EMC standards and TEMPEST standards in computer system , 2013, 2013 8th International Conference on Computer Science & Education.

[61]  Isin Erer,et al.  Realistic eavesdropping attacks on computer displays with low-cost and mobile receiver system , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[62]  Arnaud Tisserand,et al.  $\textrm{GF}(2^m)$ Finite-Field Multipliers with Reduced Activity Variations , 2012, WAIFI.

[63]  Alessandro Barenghi,et al.  Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures , 2012, Proceedings of the IEEE.

[64]  Benedikt Heinz,et al.  Localized Electromagnetic Analysis of Cryptographic Implementations , 2012, CT-RSA.

[65]  Bruno Robisson,et al.  ElectroMagnetic analysis (EMA) of software AES on Java mobile phones , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[66]  Tim Güneysu,et al.  Generic Side-Channel Countermeasures for Reconfigurable Devices , 2011, CHES.

[67]  Cliff Wang,et al.  Introduction to Hardware Security and Trust , 2011 .

[68]  Olivier Meynard,et al.  Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques , 2011, 2011 Design, Automation & Test in Europe.

[69]  Manfred Pinkal,et al.  Acoustic Side-Channel Attacks on Printers , 2010, USENIX Security Symposium.

[70]  Yasunao Suzuki,et al.  Jamming technique to prevent information leakage caused by unintentional emissions of PC video signals , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.

[71]  Patrick Schaumont,et al.  State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[72]  Andrei Szilagyi,et al.  Shielding screen design optimization , 2010, 2010 8th International Conference on Communications.

[73]  Yinghua Lu,et al.  Video information recovery from EM leakage of computers based on storage oscilloscope , 2010 .

[74]  Martin Vuagnoux,et al.  Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.

[75]  Martin Welk,et al.  Tempest in a Teapot: Compromising Reflections Revisited , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[76]  Cécile Canovas,et al.  An overview of side channel analysis attacks , 2008, ASIACCS '08.

[77]  L. Toledo-Pereyra Trust , 2006, Mediation Behaviour.

[78]  Hidema Tanaka,et al.  Evaluation and Improvement of the Tempest Fonts , 2004, WISA.

[79]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[80]  Markus G. Kuhn,et al.  Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.

[81]  Rakesh Agrawal,et al.  Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[82]  Miquel Roca,et al.  Analysis of dissipation energy of switching digital CMOS gates with coupled outputs , 2003, Microelectron. J..

[83]  Stefan Mangard,et al.  A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion , 2002, ICISC.

[84]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[85]  David A. Umphress,et al.  Information leakage from optical emanations , 2002, TSEC.

[86]  Markus G. Kuhn,et al.  Optical time-domain eavesdropping risks of CRT displays , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[87]  Jean-Jacques Quisquater,et al.  ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.

[88]  P. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[89]  A. Shamir,et al.  Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.

[90]  Peter Smulders,et al.  The threat of information theft by reception of electromagnetic radiation from RS-232 cables , 1990, Comput. Secur..

[91]  Wim van Eck,et al.  Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..

[92]  G. G. Liddle,et al.  The In Thing , 1974 .

[93]  Willis H. Ware,et al.  Security and privacy in computer systems , 1899, AFIPS '67 (Spring).

[94]  Adi Shamir,et al.  Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations , 2020, IACR Cryptol. ePrint Arch..

[95]  Yu-ichi Hayashi,et al.  Introduction to Electromagnetic Information Security , 2019, IEICE Trans. Commun..

[96]  Lejla Batina,et al.  CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel , 2019, USENIX Security Symposium.

[97]  Turki F. Al-Somani,et al.  Review of Side Channel Attacks and Countermeasures on ECC , RSA , and AES Cryptosystems , 2018 .

[98]  Milos Prvulovic,et al.  One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA , 2018, USENIX Security Symposium.

[99]  Shigeki Goto,et al.  A Feasibility Study of Radio-frequency Retroreflector Attack , 2018, WOOT @ USENIX Security Symposium.

[100]  Yang Su,et al.  USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs , 2017, USENIX Security Symposium.

[101]  Martin Marinov Remote video eavesdropping using a software-defined radio platform , 2014 .

[102]  Yinghua Lu,et al.  Novel Method to Detect and Recover the Keystrokes of Ps/2 Keyboard , 2013 .

[103]  Christof Paar,et al.  Building a Side Channel Based Disassembler , 2010, Trans. Comput. Sci..

[104]  Shari Lawrence Pfleeger,et al.  Cybersecurity Economic Issues: Clearing the Path to Good Practice , 2008, IEEE Software.

[105]  Markus G. Kuhn,et al.  Eavesdropping attacks on computer displays , 2006 .

[106]  Joy Laskar,et al.  Modern receiver front-ends , 2004 .

[107]  Eran Tromer,et al.  Acoustic cryptanalysis : on nosy people and noisy machines , 2004 .

[108]  Markus G. Kuhn,et al.  Soft Tempest { An Opportunity for NATO , 1999 .

[109]  Sue Kinn,et al.  Introduction to the hardware , 1998 .

[110]  Michael Backes,et al.  2008 IEEE Symposium on Security and Privacy Compromising Reflections –or– How to Read LCD Monitors Around the Corner , 2022 .