Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations M Guri, M Monitz, Y Mirski, Y Elovici 2015 IEEE 28th Computer Security Foundations Symposium, 276-289, 2015 | 226 | 2015 |
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies M Guri, G Kedma, A Kachlon, Y Elovici 2014 9th International Conference on Malicious and Unwanted Software: The …, 2014 | 214 | 2014 |
{GSMem}: Data exfiltration from {Air-Gapped} computers over {GSM} frequencies M Guri, A Kachlon, O Hasson, G Kedma, Y Mirsky, Y Elovici 24th USENIX Security Symposium (USENIX Security 15), 849-864, 2015 | 212 | 2015 |
USBee: Air-gap covert-channel via electromagnetic emission from USB M Guri, M Monitz, Y Elovici 2016 14th Annual Conference on Privacy, Security and Trust (PST), 264-268, 2016 | 181 | 2016 |
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED. M Guri, B Zadov, Y Elovici DIMVA 2017. Detection of Intrusions and Malware, and Vulnerability …, 2017 | 140 | 2017 |
PowerHammer: Exfiltrating data from air-gapped computers through power lines M Guri, B Zadov, D Bykhovsky, Y Elovici IEEE Transactions on Information Forensics and Security 15, 1879-1890, 2019 | 117 | 2019 |
Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields M Guri, B Zadov, Y Elovici IEEE Transactions on Information Forensics and Security 15, 1190-1203, 2019 | 105 | 2019 |
Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise (‘DiskFiltration’) M Guri, Y Solewicz, A Daidakulov, Y Elovici Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 104 | 2017 |
MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields M Guri Future Generation Computer Systems 115, 2021 | 94 | 2021 |
air-jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (ir) M Guri, D Bykhovsky Computers & Security 82, 15-29, 2019 | 89 | 2019 |
Fansmitter: Acoustic data exfiltration from (speakerless) air-gapped computers M Guri, Y Solewicz, A Daidakulov, Y Elovici arXiv preprint arXiv:1606.05915, 2016 | 88 | 2016 |
Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication M Guri, Y Solewicz, Y Elovici 2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018 | 81 | 2018 |
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs M Guri, B Zadov, A Daidakulov, Y Elovici 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-12, 2018 | 81* | 2018 |
An optical covert-channel to leak data through an air-gap M Guri, O Hasson, G Kedma, Y Elovici 2016 14th annual conference on privacy, security and trust (pst), 642-649, 2016 | 79* | 2016 |
Bridgeware: The air-gap malware M Guri, Y Elovici Communications of the ACM 61 (4), 74-82, 2018 | 65 | 2018 |
Beatcoin: Leaking private keys from air-gapped cryptocurrency wallets M Guri 2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018 | 60 | 2018 |
Ctrl-alt-led: Leaking data from air-gapped computers via keyboard leds M Guri, B Zadov, D Bykhovsky, Y Elovici 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019 | 53 | 2019 |
Bridging the air gap between isolated networks and mobile phones in a practical cyber-attack M Guri, M Monitz, Y Elovici ACM Transactions on Intelligent Systems and Technology (TIST) 8 (4), 1-25, 2017 | 53 | 2017 |
Brightness: Leaking sensitive data from air-gapped workstations via screen brightness M Guri, D Bykhovsky, Y Elovici 2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 1-6, 2019 | 50 | 2019 |
Fansmitter: Acoustic data exfiltration from air-gapped computers via fans noise M Guri, Y Solewicz, Y Elovici Computers & Security 91, 101721, 2020 | 48 | 2020 |