Filters








5 Hits in 3.6 sec

ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields [article]

Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici
2018 arXiv   pre-print
When highly sensitive data is involved, an air-gapped computer might also be kept secluded in a Faraday cage.  ...  In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers.  ...  Fig. 1 : 1 An illustration of the magnetic covert channel (ODINI). Sensitive data is exfiltrated from the secured system, through air-gap and Faraday shielding.  ... 
arXiv:1802.02700v1 fatcat:bicw3vbro5gqvoekeqlwkk52ee

ODINI: Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields

Mordechai Guri, Boris Zadov, Yuval Elovici
2019 IEEE Transactions on Information Forensics and Security  
In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers.  ...  The air-gap separation, coupled with the Faraday shield, provides a high level of isolation, preventing the potential leakage of sensitive data from the system.  ...  Our results show that data can be successfully exfiltrated from air-gapped, Faraday caged systems via low frequency magnetic fields at bitrates of 1-40 bit/sec.  ... 
doi:10.1109/tifs.2019.2938404 fatcat:5laopkvwxrf4hb6htfwee3r5vi

Table of contents

2020 IEEE Transactions on Information Forensics and Security  
Deng 1175 ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields ................... ...............................................................................  ...  Zhang 1868 PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines .................................... ............................................................................  ... 
doi:10.1109/tifs.2019.2940362 fatcat:7ieq2gue2ndr5b3pa5suaba4ke

Table of contents

2020 IEEE Transactions on Information Forensics and Security  
Choo 1164 ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields ................... ...............................................................................  ...  Beyah 1455 PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines .................................... ............................................................................  ... 
doi:10.1109/tifs.2019.2940363 fatcat:hnt75fw6nbduzh2c4x4wxdsey4

2020 Index IEEE Transactions on Information Forensics and Security Vol. 15

2020 IEEE Transactions on Information Forensics and Security  
Praseed, A., +, TIFS 2020 1790-1800 ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Com- puters via Magnetic Fields.  ...  Tajeddine, R., +, TIFS 2020 790-799 Private Polynomial Computation From Lagrange Encoding.  ... 
doi:10.1109/tifs.2021.3053735 fatcat:eforexmnczeqzdj3sc2j4yoige