Guri et al., 2017 - Google Patents
Bridging the air gap between isolated networks and mobile phones in a practical cyber-attackGuri et al., 2017
- Document ID
- 5585468438661079837
- Author
- Guri M
- Monitz M
- Elovici Y
- Publication year
- Publication venue
- ACM Transactions on Intelligent Systems and Technology (TIST)
External Links
Snippet
Information is the most critical asset of modern organizations, and accordingly it is one of the resources most coveted by adversaries. When highly sensitive data is involved, an organization may resort to air gap isolation in which there is no networking connection …
- 230000000051 modifying 0 abstract description 37
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K2203/00—Jamming of communication; Countermeasures
- H04K2203/10—Jamming or countermeasure used for a particular application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Guri et al. | Bridging the air gap between isolated networks and mobile phones in a practical cyber-attack | |
Guri et al. | AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies | |
Guri et al. | {GSMem}: Data exfiltration from {Air-Gapped} computers over {GSM} frequencies | |
Mazurczyk et al. | Information hiding as a challenge for malware detection | |
Guri et al. | Bridgeware: The air-gap malware | |
Guri et al. | Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication | |
Guri et al. | LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED | |
Do et al. | Exfiltrating data from android devices | |
US10075844B2 (en) | Enpoint security appliance/sensor platform | |
Lavaud et al. | Whispering devices: A survey on how side-channels lead to compromised information | |
Hasan et al. | Sensing-enabled channels for hard-to-detect command and control of mobile devices | |
Arabo et al. | Privacy in the age of mobility and smart devices in smart homes | |
Carrara et al. | Out-of-band covert channels—A survey | |
Guri et al. | xled: Covert data exfiltration from air-gapped networks via router leds | |
Kinugawa et al. | Electromagnetic information extortion from electronic devices using interceptor and its countermeasure | |
Guri | Air-fi: Leaking data from air-gapped computers using wi-fi frequencies | |
Tan et al. | An investigation of Bluetooth security threats | |
Guri et al. | Speaker-to-speaker covert ultrasonic communication | |
Guri | POWER-SUPPLaY: Leaking data from air-gapped systems by turning the power-supplies into speakers | |
Kasmi et al. | Air-gap Limitations and Bypass Techniques:“Command and Control” using Smart Electromagnetic Interferences | |
Rondon et al. | HDMI-walk: Attacking HDMI distribution networks via consumer electronic control protocol | |
Stergiopoulos et al. | Dropping malware through sound injection: A comparative analysis on Android operating systems | |
Guri | ETHERLED: sending covert morse signals from air-gapped devices via network card (NIC) LEDs | |
Muraleedhara et al. | Any bluetooth device can be hacked. know how? | |
Guri et al. | Lcd tempest air-gap attack reloaded |