Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack
暂无分享,去创建一个
[1] Richard Sharp,et al. Audio networking: the forgotten wireless technology , 2005, IEEE Pervasive Computing.
[2] Mordechai Guri,et al. AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies , 2014, 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE).
[3] Mordechai Guri,et al. GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies , 2015, USENIX Security Symposium.
[4] Quanyan Zhu,et al. An impact-aware defense against Stuxnet , 2013, 2013 American Control Conference.
[5] Adi Shamir,et al. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis , 2014, CRYPTO.
[6] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[7] William J. Lynn,et al. Defending a New Domain: The Pentagon's Cyberstrategy , 2010 .
[8] David A. Umphress,et al. Information leakage from optical emanations , 2002, TSEC.
[9] Michael Hanspach,et al. On Covert Acoustical Mesh Networks in Air , 2014, J. Commun..
[10] Markus G. Kuhn,et al. Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations , 1998, Information Hiding.
[11] R. J. Potts. Emission security , 1989 .
[12] Milos Prvulovic,et al. A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events , 2014, 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture.
[13] Markus G. Kuhn,et al. Compromising Emanations , 2002, Encyclopedia of Cryptography and Security.
[14] Markus G. Kuhn,et al. Optical time-domain eavesdropping risks of CRT displays , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[15] Ayman I. Kayssi,et al. Android SMS Malware: Vulnerability and Mitigation , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[16] Ralf-Philipp Weinmann,et al. Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks , 2012, WOOT.
[17] Robert W. Shirey,et al. Internet Security Glossary, Version 2 , 2007, RFC.
[18] Mordechai Guri,et al. BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[19] Michael Hanspach,et al. Recent Developments in Covert Acoustical Communications , 2014, Sicherheit.
[20] W. V. Eck. Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? , 1996 .