Mordechai Guri
TitleCited byYear
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies
M Guri, G Kedma, A Kachlon, Y Elovici
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
862014
Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations
M Guri, M Monitz, Y Mirski, Y Elovici
2015 IEEE 28th Computer Security Foundations Symposium, 276-289, 2015
752015
GSMem: Data Exfiltration from Air-Gapped Computers over {GSM} Frequencies
M Guri, A Kachlon, O Hasson, G Kedma, Y Mirsky, Y Elovici
24th {USENIX} Security Symposium ({USENIX} Security 15), 849-864, 2015
692015
USBee: air-gap covert-channel via electromagnetic emission from USB
M Guri, M Monitz, Y Elovici
2016 14th Annual Conference on Privacy, Security and Trust (PST), 264-268, 2016
452016
Fansmitter: Acoustic data exfiltration from (speakerless) air-gapped computers
M Guri, Y Solewicz, A Daidakulov, Y Elovici
arXiv preprint arXiv:1606.05915, 2016
342016
An optical covert-channel to leak data through an air-gap
M Guri, O Hasson, G Kedma, Y Elovici
2016 14th Annual Conference on Privacy, Security and Trust (PST), 642-649, 2016
29*2016
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED.
M Guri, B Zadov, Y Elovici
DIMVA 2017. Detection of Intrusions and Malware, and Vulnerability …, 2017
272017
Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise (‘DiskFiltration’)
M Guri, Y Solewicz, A Daidakulov, Y Elovici
European Symposium on Research in Computer Security, 98-115, 2017
252017
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs
M Guri, B Zadov, A Daidakulov, Y Elovici
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-12, 2018
22*2018
JoKER: Trusted detection of kernel rootkits in android devices via JTAG interface
M Guri, Y Poliak, B Shapira, Y Elovici
2015 IEEE Trustcom/BigDataSE/ISPA 1, 65-73, 2015
192015
air-jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (ir)
M Guri, D Bykhovsky
Computers & Security 82, 15-29, 2019
182019
Bridging the air gap between isolated networks and mobile phones in a practical cyber-attack
M Guri, M Monitz, Y Elovici
ACM Transactions on Intelligent Systems and Technology (TIST) 8 (4), 50, 2017
182017
Exfiltration of information from air-gapped machines using monitor's LED indicator
V Sepetnitsky, M Guri, Y Elovici
2014 IEEE Joint Intelligence and Security Informatics Conference, 264-267, 2014
172014
Diskfiltration: Data exfiltration from speakerless air-gapped computers via covert hard drive noise
M Guri, Y Solewicz, A Daidakulov, Y Elovici
arXiv preprint arXiv:1608.03431, 2016
162016
Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields
M Guri, A Daidakulov, Y Elovici
arXiv preprint arXiv:1802.02317, 2018
152018
PowerHammer: Exfiltrating data from air-gapped computers through power lines
M Guri, B Zadov, D Bykhovsky, Y Elovici
arXiv preprint arXiv:1804.04014, 2018
142018
Bridgeware: The air-gap malware
M Guri, Y Elovici
Communications of the ACM 61 (4), 74-82, 2018
102018
9-1-1 DDoS: Attacks, Analysis and Mitigation
M Guri, Y Mirsky, Y Elovici
Security and Privacy (EuroS&P), 2017 IEEE European Symposium on, 218-232, 2017
10*2017
Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication
M Guri, Y Solewicz, Y Elovici
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018
92018
Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields
M Guri, B Zadov, A Daidakulov, Y Elovici
arXiv preprint arXiv:1802.02700, 2018
92018
The system can't perform the operation now. Try again later.
Articles 1–20