[go: up one dir, main page]

Guri et al., 2017 - Google Patents

Bridging the air gap between isolated networks and mobile phones in a practical cyber-attack

Guri et al., 2017

Document ID
5585468438661079837
Author
Guri M
Monitz M
Elovici Y
Publication year
Publication venue
ACM Transactions on Intelligent Systems and Technology (TIST)

External Links

Snippet

Information is the most critical asset of modern organizations, and accordingly it is one of the resources most coveted by adversaries. When highly sensitive data is involved, an organization may resort to air gap isolation in which there is no networking connection …
Continue reading at dl.acm.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION

Similar Documents

Publication Publication Date Title
Guri et al. Bridging the air gap between isolated networks and mobile phones in a practical cyber-attack
Guri et al. AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies
Guri et al. {GSMem}: Data exfiltration from {Air-Gapped} computers over {GSM} frequencies
Mazurczyk et al. Information hiding as a challenge for malware detection
Guri et al. Bridgeware: The air-gap malware
Guri et al. Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication
Guri et al. LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Do et al. Exfiltrating data from android devices
US10075844B2 (en) Enpoint security appliance/sensor platform
Lavaud et al. Whispering devices: A survey on how side-channels lead to compromised information
Hasan et al. Sensing-enabled channels for hard-to-detect command and control of mobile devices
Arabo et al. Privacy in the age of mobility and smart devices in smart homes
Carrara et al. Out-of-band covert channels—A survey
Guri et al. xled: Covert data exfiltration from air-gapped networks via router leds
Kinugawa et al. Electromagnetic information extortion from electronic devices using interceptor and its countermeasure
Guri Air-fi: Leaking data from air-gapped computers using wi-fi frequencies
Tan et al. An investigation of Bluetooth security threats
Guri et al. Speaker-to-speaker covert ultrasonic communication
Guri POWER-SUPPLaY: Leaking data from air-gapped systems by turning the power-supplies into speakers
Kasmi et al. Air-gap Limitations and Bypass Techniques:“Command and Control” using Smart Electromagnetic Interferences
Rondon et al. HDMI-walk: Attacking HDMI distribution networks via consumer electronic control protocol
Stergiopoulos et al. Dropping malware through sound injection: A comparative analysis on Android operating systems
Guri ETHERLED: sending covert morse signals from air-gapped devices via network card (NIC) LEDs
Muraleedhara et al. Any bluetooth device can be hacked. know how?
Guri et al. Lcd tempest air-gap attack reloaded