A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields
[article]
2018
arXiv
pre-print
When highly sensitive data is involved, an air-gapped computer might also be kept secluded in a Faraday cage. ...
In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers. ...
Fig. 1 : 1 An illustration of the magnetic covert channel (ODINI). Sensitive data is exfiltrated from the secured system, through air-gap and Faraday shielding. ...
arXiv:1802.02700v1
fatcat:bicw3vbro5gqvoekeqlwkk52ee
ODINI: Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields
2019
IEEE Transactions on Information Forensics and Security
In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers. ...
The air-gap separation, coupled with the Faraday shield, provides a high level of isolation, preventing the potential leakage of sensitive data from the system. ...
Our results show that data can be successfully exfiltrated from air-gapped, Faraday caged systems via low frequency magnetic fields at bitrates of 1-40 bit/sec. ...
doi:10.1109/tifs.2019.2938404
fatcat:5laopkvwxrf4hb6htfwee3r5vi
Table of contents
2020
IEEE Transactions on Information Forensics and Security
Deng 1175 ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields ................... ............................................................................... ...
Zhang 1868 PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines .................................... ............................................................................ ...
doi:10.1109/tifs.2019.2940362
fatcat:7ieq2gue2ndr5b3pa5suaba4ke
Table of contents
2020
IEEE Transactions on Information Forensics and Security
Choo 1164 ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields ................... ............................................................................... ...
Beyah 1455 PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines .................................... ............................................................................ ...
doi:10.1109/tifs.2019.2940363
fatcat:hnt75fw6nbduzh2c4x4wxdsey4
2020 Index IEEE Transactions on Information Forensics and Security Vol. 15
2020
IEEE Transactions on Information Forensics and Security
Praseed, A., +, TIFS 2020 1790-1800
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Com-
puters via Magnetic Fields. ...
Tajeddine, R., +, TIFS 2020 790-799 Private Polynomial Computation From Lagrange Encoding. ...
doi:10.1109/tifs.2021.3053735
fatcat:eforexmnczeqzdj3sc2j4yoige