暂无分享,去创建一个
[1] Luke Deshotels,et al. Inaudible Sound as a Covert Channel in Mobile Devices , 2014, WOOT.
[2] References , 1971 .
[3] Adi Shamir,et al. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[4] Mordechai Guri,et al. AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies , 2014, 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE).
[5] Zinaida Benenson,et al. All Your Bulbs Are Belong to Us: Investigating the Current State of Security in Connected Lighting Systems , 2016, ArXiv.
[6] Michael Hanspach,et al. On Covert Acoustical Mesh Networks in Air , 2014, J. Commun..
[7] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[8] Srdjan Capkun,et al. Thermal Covert Channels on Multi-core Platforms , 2015, USENIX Security Symposium.
[9] Mordechai Guri,et al. BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[10] Mordechai Guri,et al. GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies , 2015, USENIX Security Symposium.
[11] Mordechai Guri,et al. Exfiltration of information from air-gapped machines using monitor's LED indicator , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.
[12] Kim-Kwang Raymond Choo,et al. Bridging the Air Gap: Inaudible Data Exfiltration by Insiders , 2014, AMCIS.
[13] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[14] Dawn Song,et al. Smart Locks: Lessons for Securing Commodity Internet of Things Devices , 2016, AsiaCCS.
[15] David A. Umphress,et al. Information leakage from optical emanations , 2002, TSEC.