Mordechai Guri

Orcid: 0000-0003-1806-8858

According to our database1, Mordechai Guri authored at least 70 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
AIR-FI: Leaking Data From Air-Gapped Computers Using Wi-Fi Frequencies.
IEEE Trans. Dependable Secur. Comput., 2023

POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers.
IEEE Trans. Dependable Secur. Comput., 2023

EL-GRILLO: Leaking Data Ultrasonically from Air-Gapped PCs via the Tiny Motherboard Buzzer.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

PrinterLeak: Leaking Sensitive Data by Exploiting Printer Display Panels.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

CLOUDOSCOPE: Detecting Anti-Forensic Malware using Public Cloud Environments.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

AirKeyLogger: Hardwareless Air-Gap Keylogging Attack.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
COVID-bit: Keep a Distance of (at least) 2m From My Air-Gap Computer!
CoRR, 2022

GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby Gyroscopes.
CoRR, 2022

Near Field Air-Gap Covert Channel Attack.
Proceedings of the IEEE International Conference on Trust, 2022

SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans.
Proceedings of the Secure IT Systems, 2022

ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDs.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
DDoS Attacks on 9-1-1 Emergency Services.
IEEE Trans. Dependable Secur. Comput., 2021

Exfiltrating data from air-gapped computers via ViBrAtIoNs.
Future Gener. Comput. Syst., 2021

MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields.
Future Gener. Comput. Syst., 2021

LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables.
CoRR, 2021

GAIROSCOPE: Leaking Data from Air-Gapped Computers to Nearby Smartphones using Speakers-to-Gyro Communication.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

USBCulprit: USB-borne Air-Gap Malware.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables Emission.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields.
IEEE Trans. Inf. Forensics Secur., 2020

PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines.
IEEE Trans. Inf. Forensics Secur., 2020

Speaker-to-speaker covert ultrasonic communication.
J. Inf. Secur. Appl., 2020

POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers.
IACR Cryptol. ePrint Arch., 2020

AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers.
CoRR, 2020

AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs.
CoRR, 2020

BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness.
CoRR, 2020

Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise.
Comput. Secur., 2020

CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Using malware for the greater good: Mitigating data leakage.
J. Netw. Comput. Appl., 2019

Optical air-gap exfiltration attack via invisible images.
J. Inf. Secur. Appl., 2019

aIR-Jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (IR).
Comput. Secur., 2019

HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication.
CoRR, 2018

ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields.
CoRR, 2018

MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields.
CoRR, 2018

Bridgeware: the air-gap malware.
Commun. ACM, 2018

xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Optical Covert Channel from Air-Gapped Networks via Remote Orchestration of Router/Switch LEDs.
Proceedings of the European Intelligence and Security Informatics Conference, 2018

MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack.
ACM Trans. Intell. Syst. Technol., 2017

aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR).
CoRR, 2017

HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System.
CoRR, 2017

xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs.
CoRR, 2017

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED.
CoRR, 2017

SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

9-1-1 DDoS: Attacks, Analysis and Mitigation.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration').
Proceedings of the Computer Security - ESORICS 2017, 2017

LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise.
CoRR, 2016

Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers.
CoRR, 2016

9-1-1 DDoS: Threat, Analysis and Mitigation.
CoRR, 2016

VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap.
CoRR, 2016

USBee: Air-gap covert-channel via electromagnetic emission from USB.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

An optical covert-channel to leak data through an air-gap.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling.
Proceedings of the Future Network Systems and Security - Second International Conference, 2016

Personal Information Leakage During Password Recovery of Internet Services.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

2015
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies.
Proceedings of the 24th USENIX Security Symposium, 2015

JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Limiting access to unintentionally leaked sensitive documents using malware signatures.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Peers-Based Location of Mobile Devices.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Noninvasive detection of anti-forensic malware.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

Analyzing users' web surfing patterns to trace terrorists and criminals.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013


  Loading...