Optical Exfiltration of Data via Keyboard LED Status Indicators to IP Cameras
نویسندگان
چکیده
منابع مشابه
Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators
The light-emitting diode(LED) is widely used as an indicator on the information device. Early in 2002, Loughry et al studied the exfiltration of LED indicators[16] and found the kind of LEDs unmodulated to indicate some state of the device can hardly be utilized to establish covert channels. In our paper, a novel approach is proposed to modulate this kind of LEDs. We use binary frequency shift ...
متن کاملHost-Based Data Exfiltration Detection via System Call Sequences
The host-based detection of malicious data exfiltration activities is currently a sparse area of research and mostly limited to methods that analyze network traffic or signature based detection methods that target specific processes. In this paper we explore an alternative method to host-based detection that exploits sequences of system calls and new collection methods that allow us to catch th...
متن کاملaIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR)
Infrared (IR) light is invisible to humans, but cameras are optically sensitive to this type of light. In this paper, we show how attackers can use surveillance cameras and infrared light to establish bi-directional covert communication between the internal networks of organizations and remote attackers. We present two scenarios: exfiltration (leaking data out of the network) and infiltration (...
متن کاملSecure SDN Frameworkfor Data Exfiltration via Video Steganography
The popularity of steganography in the data exfiltration of private corporate sensitive data is increased. So it is important to detect such malicious activity. Becausethe data being transferred can hide the large amount of data in video becoming increasingly attractive. To ensure privacy and security we proposed an effective steganalysis method to detect hidden data in video by using the SDN f...
متن کاملBrowser-Based Covert Data Exfiltration
Current best practices heavily control user permissions on network systems. This effectively mitigates many insider threats regarding the collection and exfiltration of data. Many methods of covert communication involve crafting custom packets, typically requiring both the necessary software and elevated privileges on the system. By exploiting the functionality of a browser, covert channels for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2019
ISSN: 2327-4662,2372-2541
DOI: 10.1109/jiot.2018.2842116