Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
exfiltration
biblio
ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDs
Submitted by grigby1 on Fri, 01/06/2023 - 2:59pm
Cameras
printers
Ethernet
optical
air-gap
exfiltration
Air gaps
covert channel
Image color analysis
surveillance
pubcrawl
malware
encoding
composability
light emitting diodes
Resiliency
resilience
Metrics
Human behavior
biblio
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables
Submitted by grigby1 on Fri, 01/06/2023 - 2:59pm
Network
SATA
leakage
electromagnetic
Workstations
radio transmitters
air-gap
exfiltration
Air gaps
covert channels
pubcrawl
Virtual machining
composability
Computers
Wireless communication
wireless sensor networks
Resiliency
resilience
Metrics
Human behavior
biblio
LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables Emission
Submitted by grigby1 on Mon, 12/20/2021 - 12:18pm
Human behavior
Virtual machining
Resiliency
resilience
pubcrawl
Portable computers
Metrics
Meters
malware
LAN
Air gaps
exfiltration
Ethernet
electromagnetic
data leakage
covert channels
Computers
composability
Communication cables
air-gap
biblio
CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives
Submitted by grigby1 on Mon, 01/25/2021 - 10:27am
novel acoustic covert channel
Drives
exfiltration
Human behavior
Human Factors
internet
invasive software
loudspeakers
malware
Metrics
nearby Internet connected receiver
digital versatile discs
optical drives
optical modulation
optical receivers
process sensitive information
pubcrawl
resilience
Resiliency
signal generation
smart phones
composability
acoustic signal detection
acoustical characteristics
Acoustics
air gap
Air gaps
air-gapped environment
air-gapped networks
audioless air-gapped computers
CD-LEAK
acoustic
compromised computer
computer network security
computer speakers
Computers
covert acoustic signals
covert channels
data modulation
Demodulation
demodulation algorithms
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
malicious actor
covert
data
Data Exfiltration
exfiltration
free-space optical communication
highly secured network
home networks
Image color analysis
insecure IoT
IoT
Chromium
professional networks
security measures
security standard
sensitive environments
smart bulb
strict security policies
unprecedented threats
web bluetooth api
Cyber Physical System
bluetooth security
sensitive information
Internet of Things
security
computer network security
invasive software
pubcrawl
composability
Resiliency
resilience
Human behavior
IoT devices
Cryptography
Software
cyber physical systems
Payloads
Browsers
botnets
air gapped network
Bluetooth
Bluetooth IoT
Bluetooth smart bulb
biblio
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
optical equipment
light emitting diodes
light sensor
malicious insider
malware
Metrics
modern cyber-attack
modern USB keyboards
Network
Num-Lock
optical
optical communication
Keyboards
Optical sensors
pubcrawl
Receivers
remote cameras
resilience
Resiliency
Scroll-Lock
sensitive optical sensors
smart phones
Trusted Computing
Universal Serial Bus
CTRL-ALT-LED
Air gaps
air-gap
air-gapped computers
airgapped computers
bit rate 120.0 bit/s
bit rate 3000.0 bit/s
Cameras
Caps-Lock
composability
computer network security
covert channel
advanced persistent threat
data leakage prevention systems
evil maid attacks
exfiltrate data
exfiltration
firmware
Human behavior
Human Factors
invasive software
keyboard
keyboard LEDs
biblio
HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
HOTSPOT
air-gapped PCs
airgap crossing technique
Android (operating system)
Android app
covert-channels
CPUs
exfiltration
GPUs
air-gapped computers
isolated PCs
nearby smartphone
temperature
thermal
thermal pings
thermal sensing
thermal signals
pubcrawl
air-gap covert communication channels
air-gap
Air gaps
Information Leakage
Smartphones
smart phones
resilience
Metrics
mobile computing
composability
internet
computer network security
Resiliency
Human Factors
Human behavior
biblio
Detection of Exfiltration and Tunneling over DNS
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
IP networks
tunneling
Servers
Scalability
Resiliency
resilience
pubcrawl
Monitoring
Metrics
Measurement
malware
malicious purposes
machine learning models
machine learning
learning (artificial intelligence)
advanced persistent threat attacks
IOC
invasive software
information exfiltration
indicator of compromise
Human behavior
exfiltration
encoding
domain name system
DNS tunnel
DNS
command and control systems
command & control servers
C&c
advanced persistent threats