Skip to main content

Showing 1–29 of 29 results for author: Guri, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2212.03520  [pdf, other

    cs.CR

    COVID-bit: Keep a Distance of (at least) 2m From My Air-Gap Computer!

    Authors: Mordechai Guri

    Abstract: Air-gapped systems are isolated from the Internet due to the sensitive information they handle. This paper presents COVID-bit, a new COVert channel attack that leaks sensitive information over the air from highly isolated systems. The information emanates from the air-gapped computer over the air to a distance of 2m and more and can be picked up by a nearby insider or spy with a mobile phone or la… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: This is an significantly extended version of a shorter paper accepted to IEEE TrustCom 2022

  2. ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDs

    Authors: Mordechai Guri

    Abstract: Highly secure devices are often isolated from the Internet or other public networks due to the confidential information they process. This level of isolation is referred to as an 'air-gap .' In this paper, we present a new technique named ETHERLED, allowing attackers to leak data from air-gapped networked devices such as PCs, printers, network cameras, embedded controllers, and servers. Networke… ▽ More

    Submitted 21 August, 2022; originally announced August 2022.

  3. GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby Gyroscopes

    Authors: Mordechai Guri

    Abstract: It is known that malware can leak data from isolated, air-gapped computers to nearby smartphones using ultrasonic waves. However, this covert channel requires access to the smartphone's microphone, which is highly protected in Android OS and iOS, and might be non-accessible, disabled, or blocked. In this paper we present `GAIROSCOPE,' an ultrasonic covert channel that doesn't require a microphon… ▽ More

    Submitted 20 August, 2022; originally announced August 2022.

    Journal ref: 2021 18th International Conference on Privacy, Security and Trust (PST)

  4. arXiv:2207.07413  [pdf, other

    cs.CR

    SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables

    Authors: Mordechai Guri

    Abstract: This paper introduces a new type of attack on isolated, air-gapped workstations. Although air-gap computers have no wireless connectivity, we show that attackers can use the SATA cable as a wireless antenna to transfer radio signals at the 6 GHz frequency band. The Serial ATA (SATA) is a bus interface widely used in modern computers and connects the host bus to mass storage devices such as hard di… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  5. LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables

    Authors: Mordechai Guri

    Abstract: Air-gapped networks are wired with Ethernet cables since wireless connections are strictly prohibited. In this paper we present LANTENNA - a new type of electromagnetic attack allowing adversaries to leak sensitive data from isolated, air-gapped networks. Malicious code in air-gapped computers gathers sensitive data and then encodes it over radio waves emanating from the Ethernet cables, using t… ▽ More

    Submitted 30 September, 2021; originally announced October 2021.

    Comments: Modified version accepted to 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 2021

    Journal ref: 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 2021, pp. 745-754

  6. arXiv:2012.06884  [pdf, other

    cs.CR

    AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers

    Authors: Mordechai Guri

    Abstract: In this paper, we show that attackers can exfiltrate data from air-gapped computers via Wi-Fi signals. Malware in a compromised air-gapped computer can generate signals in the Wi-Fi frequency bands. The signals are generated through the memory buses - no special hardware is required. Sensitive data can be modulated and secretly exfiltrated on top of the signals. We show that nearby Wi-Fi capable d… ▽ More

    Submitted 12 December, 2020; originally announced December 2020.

  7. arXiv:2005.00395  [pdf, other

    cs.CR

    POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers

    Authors: Mordechai Guri

    Abstract: It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of loudspeakers can be strictly forbidden. Such audio-less systems are considered to be \textit{audio-gapped}, and hence immune to acoustic covert cha… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

  8. arXiv:2004.06195  [pdf, other

    cs.CR

    AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs

    Authors: Mordechai Guri

    Abstract: Air-gap covert channels are special types of covert communication channels that enable attackers to exfiltrate data from isolated, network-less computers. Various types of air-gap covert channels have been demonstrated over the years, including electromagnetic, magnetic, acoustic, optical, and thermal. In this paper, we introduce a new type of vibrational (seismic) covert channel. We observe tha… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

  9. BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness

    Authors: Mordechai Guri, Dima Bykhovsky, Yuval Elovici

    Abstract: Air-gapped computers are systems that are kept isolated from the Internet since they store or process sensitive information. In this paper, we introduce an optical covert channel in which an attacker can leak (or, exfiltlrate) sensitive information from air-gapped computers through manipulations on the screen brightness. This covert channel is invisible and it works even while the user is workin… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

    Comments: 2019 12th CMI Conference on Cybersecurity and Privacy (CMI)

  10. CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs

    Authors: Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici

    Abstract: Using the keyboard LEDs to send data optically was proposed in 2002 by Loughry and Umphress [1] (Appendix A). In this paper we extensively explore this threat in the context of a modern cyber-attack with current hardware and optical equipment. In this type of attack, an advanced persistent threat (APT) uses the keyboard LEDs (Caps-Lock, Num-Lock and Scroll-Lock) to encode information and exfiltrat… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.

    Comments: arXiv admin note: text overlap with arXiv:1706.01140

    Journal ref: 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)

  11. arXiv:1804.08714  [pdf, other

    cs.CR

    BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets

    Authors: Mordechai Guri

    Abstract: Cryptocurrency wallets store the wallets private key(s), and hence, are a lucrative target for attackers. With possession of the private key, an attacker virtually owns all of the currency in the compromised wallet. Managing cryptocurrency wallets offline, in isolated ('air-gapped') computers, has been suggested in order to secure the private keys from theft. Such air-gapped wallets are often refe… ▽ More

    Submitted 23 April, 2018; originally announced April 2018.

  12. arXiv:1804.04014  [pdf, other

    cs.CR

    PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

    Authors: Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici

    Abstract: In this paper we provide an implementation, evaluation, and analysis of PowerHammer, a malware (bridgeware [1]) that uses power lines to exfiltrate data from air-gapped computers. In this case, a malicious code running on a compromised computer can control the power consumption of the system by intentionally regulating the CPU utilization. Data is modulated, encoded, and transmitted on top of the… ▽ More

    Submitted 10 April, 2018; originally announced April 2018.

    Comments: arXiv admin note: text overlap with arXiv:1802.02700

  13. arXiv:1803.03422  [pdf, other

    cs.CR

    MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication

    Authors: Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici

    Abstract: In this paper we show how two (or more) airgapped computers in the same room, equipped with passive speakers, headphones, or earphones can covertly exchange data via ultrasonic waves. Microphones are not required. Our method is based on the capability of a malware to exploit a specific audio chip feature in order to reverse the connected speakers from output devices into input devices - unobtrusiv… ▽ More

    Submitted 16 March, 2018; v1 submitted 9 March, 2018; originally announced March 2018.

  14. arXiv:1802.02700  [pdf, other

    cs.CR

    ODINI : Esca** Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields

    Authors: Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici

    Abstract: Air-gapped computers are computers which are kept isolated from the Internet, because they store and process sensitive information. When highly sensitive data is involved, an air-gapped computer might also be kept secluded in a Faraday cage. The Faraday cage prevents the leakage of electromagnetic signals emanating from various computer parts, which may be picked up by an eavesdrop** adversary r… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

  15. arXiv:1802.02317  [pdf

    cs.CR

    MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields

    Authors: Mordechai Guri, Andrey Daidakulov, Yuval Elovici

    Abstract: In this paper, we show that attackers can leak data from isolated, air-gapped computers to nearby smartphones via covert magnetic signals. The proposed covert channel works even if a smartphone is kept inside a Faraday shielding case, which aims to block any type of inbound and outbound wireless communication (Wi-Fi, cellular, Bluetooth, etc.). The channel also works if the smartphone is set in ai… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

  16. arXiv:1709.05742  [pdf

    cs.CR

    aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR)

    Authors: Mordechai Guri, Dima Bykhovsky, Yuval Elovici

    Abstract: Infrared (IR) light is invisible to humans, but cameras are optically sensitive to this type of light. In this paper, we show how attackers can use surveillance cameras and infrared light to establish bi-directional covert communication between the internal networks of organizations and remote attackers. We present two scenarios: exfiltration (leaking data out of the network) and infiltration (s… ▽ More

    Submitted 17 September, 2017; originally announced September 2017.

  17. arXiv:1706.01140  [pdf

    cs.CR

    xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs

    Authors: Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici

    Abstract: In this paper we show how attackers can covertly leak data (e.g., encryption keys, passwords and files) from highly secure or air-gapped networks via the row of status LEDs that exists in networking equipment such as LAN switches and routers. Although it is known that some network equipment emanates optical signals correlated with the information being processed by the device ('side-channel'), int… ▽ More

    Submitted 4 June, 2017; originally announced June 2017.

  18. arXiv:1703.10454  [pdf

    cs.CR cs.NI

    HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System

    Authors: Yisroel Mirsky, Mordechai Guri, Yuval Elovici

    Abstract: Modern corporations physically separate their sensitive computational infrastructure from public or other accessible networks in order to prevent cyber-attacks. However, attackers still manage to infect these networks, either by means of an insider or by infiltrating the supply chain. Therefore, an attacker's main challenge is to determine a way to command and control the compromised hosts that ar… ▽ More

    Submitted 30 March, 2017; originally announced March 2017.

    Comments: 7 Figures, 10 Pages

  19. arXiv:1702.06715  [pdf

    cs.CR

    LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED

    Authors: Mordechai Guri, Boris Zadov, Eran Atias, Yuval Elovici

    Abstract: In this paper we present a method which allows attackers to covertly leak data from isolated, air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which exists in most of today's desktop PCs, laptops and servers. We show that a malware can indirectly control the HDD LED, turning it on and off rapidly (up to 5800 blinks per second) - a rate that exceeds the visual percep… ▽ More

    Submitted 22 February, 2017; originally announced February 2017.

  20. arXiv:1611.07350  [pdf

    cs.CR

    SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit

    Authors: Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici

    Abstract: It is possible to manipulate the headphones (or earphones) connected to a computer, silently turning them into a pair of eavesdrop** microphones - with software alone. The same is also true for some types of loudspeakers. This paper focuses on this threat in a cyber-security context. We present SPEAKE(a)R, a software that can covertly turn the headphones connected to a PC into a microphone. We p… ▽ More

    Submitted 22 November, 2016; originally announced November 2016.

  21. arXiv:1609.02353  [pdf

    cs.CR

    9-1-1 DDoS: Threat, Analysis and Mitigation

    Authors: Mordechai Guri, Yisroel Mirsky, Yuval Elovici

    Abstract: The 911 emergency service belongs to one of the 16 critical infrastructure sectors in the United States. Distributed denial of service (DDoS) attacks launched from a mobile phone botnet pose a significant threat to the availability of this vital service. In this paper we show how attackers can exploit the cellular network protocols in order to launch an anonymized DDoS attack on 911. The current F… ▽ More

    Submitted 8 September, 2016; originally announced September 2016.

  22. arXiv:1608.08397  [pdf

    cs.CR

    USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB

    Authors: Mordechai Guri, Matan Monitz, Yuval Elovici

    Abstract: In recent years researchers have demonstrated how attackers could use USB connectors implanted with RF transmitters to exfiltrate data from secure, and even air-gapped, computers (e.g., COTTONMOUTH in the leaked NSA ANT catalog). Such methods require a hardware modification of the USB plug or device, in which a dedicated RF transmitter is embedded. In this paper we present USBee, a software that c… ▽ More

    Submitted 30 August, 2016; originally announced August 2016.

  23. arXiv:1608.03431  [pdf

    cs.CR

    DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise

    Authors: Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici

    Abstract: Air-gapped computers are disconnected from the Internet physically and logically. This measure is taken in order to prevent the leakage of sensitive data from secured networks. In the past, it has been shown that malware can exfiltrate data from air-gapped computers by transmitting ultrasonic signals via the computer's speakers. However, such acoustic communication relies on the availability of sp… ▽ More

    Submitted 11 August, 2016; originally announced August 2016.

  24. arXiv:1608.01492  [pdf

    cs.CR

    Personal Information Leakage During Password Recovery of Internet Services

    Authors: Mordechai Guri, Eyal Shemer, Dov Shirtz, Yuval Elovici

    Abstract: In this paper we examine the standard password recovery process of large Internet services such as Gmail, Facebook, and Twitter. Although most of these services try to maintain user privacy, with regard to registration information and other personal information provided by the user, we demonstrate that personal information can still be obtained by unauthorized individuals or attackers. This inform… ▽ More

    Submitted 4 August, 2016; originally announced August 2016.

  25. arXiv:1607.03946  [pdf

    cs.CR

    VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap

    Authors: Mordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici

    Abstract: In recent years, various out-of-band covert channels have been proposed that demonstrate the feasibility of leaking data out of computers without the need for network connectivity. The methods proposed have been based on different type of electromagnetic, acoustic, and thermal emissions. However, optical channels have largely been considered less covert: because they are visible to the human eye a… ▽ More

    Submitted 19 July, 2016; v1 submitted 13 July, 2016; originally announced July 2016.

  26. arXiv:1606.05915  [pdf

    cs.CR

    Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers

    Authors: Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici

    Abstract: Because computers may contain or interact with sensitive information, they are often air-gapped and in this way kept isolated and disconnected from the Internet. In recent years the ability of malware to communicate over an air-gap by transmitting sonic and ultrasonic signals from a computer speaker to a nearby receiver has been shown. In order to eliminate such acoustic channels, current best pra… ▽ More

    Submitted 19 June, 2016; originally announced June 2016.

  27. JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface

    Authors: Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici

    Abstract: Smartphones and tablets have become prime targets for malware, due to the valuable private and corporate information they hold. While Anti-Virus (AV) program may successfully detect malicious applications (apps), they remain ineffective against low-level rootkits that evade detection mechanisms by masking their own presence. Furthermore, any detection mechanism run on the same physical device as t… ▽ More

    Submitted 13 December, 2015; originally announced December 2015.

    Comments: IEEE TrustCom 2015

  28. arXiv:1503.07919  [pdf

    cs.CR

    BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations

    Authors: Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici

    Abstract: It has been assumed that the physical separation (air-gap) of computers provides a reliable level of security, such that should two adjacent computers become compromised, the covert exchange of data between them would be impossible. In this paper, we demonstrate BitWhisper, a method of bridging the air-gap between adjacent compromised computers by using their heat emissions and built-in thermal se… ▽ More

    Submitted 26 March, 2015; originally announced March 2015.

  29. arXiv:1411.0237  [pdf

    cs.CR

    AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies

    Authors: Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici

    Abstract: Information is the most critical asset of modern organizations, and accordingly coveted by adversaries. When highly sensitive data is involved, an organization may resort to air-gap isolation, in which there is no networking connection between the inner network and the external world. While infiltrating an air-gapped network has been proven feasible in recent years (e.g., Stuxnet), data exfiltrati… ▽ More

    Submitted 2 November, 2014; originally announced November 2014.