2015 IEEE 28th Computer Security Foundations Symposium 2015
DOI: 10.1109/csf.2015.26
|View full text |Cite
|
Sign up to set email alerts
|

BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
71
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 138 publications
(77 citation statements)
references
References 8 publications
0
71
0
1
Order By: Relevance
“…Using this technique they established socalled speaker-to-speaker air-gap communication between two computers in the same room via ultrasonic waves. BitWhisper [16], presented in 2015, exploits the computer's heat emissions and PC thermal sensors to create a thermal covert channel between computers. This method enabled bidirectional covert communication between two adjacent air-gapped computers.…”
Section: A Electromagnetic Magnetic Acoustic and Thermalmentioning
confidence: 99%
“…Using this technique they established socalled speaker-to-speaker air-gap communication between two computers in the same room via ultrasonic waves. BitWhisper [16], presented in 2015, exploits the computer's heat emissions and PC thermal sensors to create a thermal covert channel between computers. This method enabled bidirectional covert communication between two adjacent air-gapped computers.…”
Section: A Electromagnetic Magnetic Acoustic and Thermalmentioning
confidence: 99%
“…In 2018, Guri et al presented PowerHammer [16], a method to exfiltrate data from airgapped computers through power lines. Other types of air-gap covert channels based on acoustic [17]- [20], optical [21]- [28] and thermal [29] emissions have also been investigated.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the authors could also use this information to determine which VMs share this infrastructure. Power related covert channels have been shown by Guri et al [6]. The authors established a covert channel between two air-gapped systems by only using the temperature sensors on the two systems.…”
Section: Related Workmentioning
confidence: 99%
“…The number of possible paths is calculated as shown in Equation (5), where c (N ) s is element s of the vector c (N ) . We can now use Equation (4) and Equation (5) in Equation (1) to obtain Equation (6). Inserting the parameters for…”
Section: Channel Capacity Boundmentioning
confidence: 99%