POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers [PDF]
It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of ...
Guri, Mordechai
core +1 more source
Implementation of hybrid artificial intelligence technique to detect covert channels in new generation network protocol IPv6 [PDF]
Intrusion detection systems offer monolithic way to detect attacks through monitoring, searching for abnormal characteristics and malicious behavior in network communications.
Ma, X, Peytchev, E, Salih, A
core +1 more source
Covert communication in relay and RIS networks
Covert communication aims to prevent the warden from detecting the presence of communications, i.e. with a negligible detection probability. When the distance between the transmitter and the legitimate receiver is large, large transmission power is ...
Hu Jinsong +4 more
doaj +1 more source
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations
It has been assumed that the physical separation (air-gap) of computers provides a reliable level of security, such that should two adjacent computers become compromised, the covert exchange of data between them would be impossible.
Elovici, Yuval +3 more
core +1 more source
Enhancing Covert Secrecy Rate in a Zero-Forcing UAV Jammer-Assisted Covert Communication
Covert communications can hide confidential signals in environmental noise to avoid being detected and provide comprehensive security for wireless transmissions. However, there still exist significant risks in wireless transmission once being detected.
Xinying Chen +2 more
openaire +2 more sources
Research on Covert Channels Based on Block Coding of MQTT Protocol Commands [PDF]
The carrier of traditional network covert channels is limited to the Internet protocol.To address this problem,based on the research of the Message Queuing Telemetry Transmission(MQTT) protocol at the application layer of Internet of Things(IoT),this ...
DENG Yuxin, TANG Zhangguo, ZHANG Jian, LI Huanzhou
doaj +1 more source
A Covert Queueing Channel in FCFS Schedulers
We study covert queueing channels (CQCs), which are a kind of covert timing channel that may be exploited in shared queues across supposedly isolated users.
Ghassami, AmirEmad, Kiyavash, Negar
core +1 more source
Performance analysis of covert wireless communication based on beam forming with noise uncertainty
In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the ...
Yuda LIN +3 more
doaj +2 more sources
No Advantage for Separating Overt and Covert Attention in Visual Search
We move our eyes roughly three times every second while searching complex scenes, but covert attention helps to guide where we allocate those overt fixations.
W. Joseph MacInnes +3 more
doaj +1 more source
Network covert channels capacity limitation by adding random delays before packet sending
Attention to covert channels has largely increased due to the documents published by E. Snowden, which described the software and hardware embedding that implement undeclared features of covert information transfer in the Huawei and Juniper network ...
Anna I. Belozubova +2 more
doaj +1 more source

