Mordechai Guri
Orcid: 0000-0003-1806-8858
According to our database1,
Mordechai Guri
authored at least 74 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via 'Singing Pixels'.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers.
IEEE Trans. Dependable Secur. Comput., 2023
EL-GRILLO: Leaking Data Ultrasonically from Air-Gapped PCs via the Tiny Motherboard Buzzer.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
2022
CoRR, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans.
Proceedings of the Secure IT Systems, 2022
ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDs.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Future Gener. Comput. Syst., 2021
MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields.
Future Gener. Comput. Syst., 2021
GAIROSCOPE: Leaking Data from Air-Gapped Computers to Nearby Smartphones using Speakers-to-Gyro Communication.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
2020
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers.
IACR Cryptol. ePrint Arch., 2020
AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs.
CoRR, 2020
BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness.
CoRR, 2020
Comput. Secur., 2020
CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
2019
J. Netw. Comput. Appl., 2019
aIR-Jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (IR).
Comput. Secur., 2019
HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature.
Proceedings of the European Intelligence and Security Informatics Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
2018
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication.
CoRR, 2018
ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields.
CoRR, 2018
MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields.
CoRR, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Optical Covert Channel from Air-Gapped Networks via Remote Orchestration of Router/Switch LEDs.
Proceedings of the European Intelligence and Security Informatics Conference, 2018
MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
2017
Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack.
ACM Trans. Intell. Syst. Technol., 2017
aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR).
CoRR, 2017
LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED.
CoRR, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration').
Proceedings of the Computer Security - ESORICS 2017, 2017
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
2016
DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise.
CoRR, 2016
CoRR, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Future Network Systems and Security - Second International Conference, 2016
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
2014
Limiting access to unintentionally leaked sensitive documents using malware signatures.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013