1 code implementation • 10 Jul 2019 • Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici
In this type of attack, an advanced persistent threat (APT) uses the keyboard LEDs (Caps-Lock, Num-Lock and Scroll-Lock) to encode information and exfiltrate data from airgapped computers optically.
Cryptography and Security Signal Processing
1 code implementation • 2 Nov 2014 • Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici
In this paper we present "AirHopper", a bifurcated malware that bridges the air-gap between an isolated network and nearby infected mobile phones using FM signals.
Cryptography and Security