


default search action
Mordechai Guri
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Mordechai Guri
:
Air-Gap Electromagnetic Covert Channel. IEEE Trans. Dependable Secur. Comput. 21(4): 2127-2144 (2024) - [j15]Raphael Alper
, Mordechai Guri
:
TrueWatch: Polygraph Examination With Smartwatches. IEEE Trans. Inf. Forensics Secur. 19: 7478-7491 (2024) - [c39]Mordechai Guri:
PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via 'Singing Pixels'. COMPSAC 2024: 976-987 - [i33]Mordechai Guri:
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM. CoRR abs/2409.02292 (2024) - [i32]Mordechai Guri:
Mind The Gap: Can Air-Gaps Keep Your Private Data Secure? CoRR abs/2409.04190 (2024) - [i31]Mordechai Guri:
PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via 'Singing Pixels'. CoRR abs/2409.04930 (2024) - 2023
- [j14]Mordechai Guri
:
POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers. IEEE Trans. Dependable Secur. Comput. 20(1): 313-330 (2023) - [j13]Mordechai Guri
:
AIR-FI: Leaking Data From Air-Gapped Computers Using Wi-Fi Frequencies. IEEE Trans. Dependable Secur. Comput. 20(3): 2547-2564 (2023) - [c38]Mordechai Guri:
AirKeyLogger: Hardwareless Air-Gap Keylogging Attack. COMPSAC 2023: 637-647 - [c37]Mordechai Guri
:
CLOUDOSCOPE: Detecting Anti-Forensic Malware using Public Cloud Environments. EICC 2023: 100-107 - [c36]Mordechai Guri:
PrinterLeak: Leaking Sensitive Data by Exploiting Printer Display Panels. ICCSA (Workshops 3) 2023: 202-217 - [c35]Mordechai Guri
:
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM. NordSec 2023: 144-161 - [c34]Mordechai Guri:
EL-GRILLO: Leaking Data Ultrasonically from Air-Gapped PCs via the Tiny Motherboard Buzzer. PST 2023: 1-11 - 2022
- [c33]Mordechai Guri:
ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDs. CSR 2022: 163-170 - [c32]Mordechai Guri
:
GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans. NordSec 2022: 194-211 - [c31]Mordechai Guri:
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables. PST 2022: 1-10 - [c30]Mordechai Guri:
Near Field Air-Gap Covert Channel Attack. TrustCom 2022: 490-497 - [i30]Mordechai Guri:
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables. CoRR abs/2207.07413 (2022) - [i29]Mordechai Guri:
GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby Gyroscopes. CoRR abs/2208.09764 (2022) - [i28]Mordechai Guri:
ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDs. CoRR abs/2208.09975 (2022) - [i27]Mordechai Guri:
COVID-bit: Keep a Distance of (at least) 2m From My Air-Gap Computer! CoRR abs/2212.03520 (2022) - 2021
- [j12]Mordechai Guri:
MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields. Future Gener. Comput. Syst. 115: 115-125 (2021) - [j11]Mordechai Guri
:
Exfiltrating data from air-gapped computers via ViBrAtIoNs. Future Gener. Comput. Syst. 122: 69-81 (2021) - [j10]Yisroel Mirsky
, Mordechai Guri
:
DDoS Attacks on 9-1-1 Emergency Services. IEEE Trans. Dependable Secur. Comput. 18(6): 2767-2786 (2021) - [c29]Mordechai Guri:
LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables Emission. COMPSAC 2021: 745-754 - [c28]Mordechai Guri:
USBCulprit: USB-borne Air-Gap Malware. EICC 2021: 7-13 - [c27]Mordechai Guri:
GAIROSCOPE: Leaking Data from Air-Gapped Computers to Nearby Smartphones using Speakers-to-Gyro Communication. PST 2021: 1-10 - [i26]Mordechai Guri:
LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables. CoRR abs/2110.00104 (2021) - 2020
- [j9]Mordechai Guri
, Yosef A. Solewicz, Yuval Elovici:
Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise. Comput. Secur. 91: 101721 (2020) - [j8]Mordechai Guri, Yosef A. Solewicz, Yuval Elovici:
Speaker-to-speaker covert ultrasonic communication. J. Inf. Secur. Appl. 51: 102458 (2020) - [j7]Mordechai Guri, Boris Zadov, Yuval Elovici:
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields. IEEE Trans. Inf. Forensics Secur. 15: 1190-1203 (2020) - [j6]Mordechai Guri
, Boris Zadov, Dima Bykhovsky
, Yuval Elovici
:
PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines. IEEE Trans. Inf. Forensics Secur. 15: 1879-1890 (2020) - [c26]Mordechai Guri:
CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives. COMPSAC 2020: 808-816 - [i25]Mordechai Guri, Dima Bykhovsky, Yuval Elovici:
BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness. CoRR abs/2002.01078 (2020) - [i24]Mordechai Guri:
AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs. CoRR abs/2004.06195 (2020) - [i23]Mordechai Guri:
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers. CoRR abs/2005.00395 (2020) - [i22]Mordechai Guri:
AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers. CoRR abs/2012.06884 (2020) - [i21]Mordechai Guri:
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers. IACR Cryptol. ePrint Arch. 2020: 516 (2020)
2010 – 2019
- 2019
- [j5]Mordechai Guri, Dima Bykhovsky
:
aIR-Jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (IR). Comput. Secur. 82: 15-29 (2019) - [j4]Mordechai Guri:
Optical air-gap exfiltration attack via invisible images. J. Inf. Secur. Appl. 46: 222-230 (2019) - [j3]Mordechai Guri, Rami Puzis, Kim-Kwang Raymond Choo, Sergey Rubinshtein, Gabi Kedma, Yuval Elovici:
Using malware for the greater good: Mitigating data leakage. J. Netw. Comput. Appl. 145 (2019) - [c25]Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici:
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs. COMPSAC (1) 2019: 801-810 - [c24]Mordechai Guri:
HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature. EISIC 2019: 94-100 - [i20]Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici:
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs. CoRR abs/1907.05851 (2019) - 2018
- [j2]Mordechai Guri, Yuval Elovici:
Bridgeware: the air-gap malware. Commun. ACM 61(4): 74-82 (2018) - [c23]Mordechai Guri, Yosef A. Solewicz, Yuval Elovici:
MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication. DSC 2018: 1-8 - [c22]Mordechai Guri:
Optical Covert Channel from Air-Gapped Networks via Remote Orchestration of Router/Switch LEDs. EISIC 2018: 54-60 - [c21]Mordechai Guri:
BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets. iThings/GreenCom/CPSCom/SmartData 2018: 1308-1316 - [c20]Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici:
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs. PST 2018: 1-12 - [i19]Mordechai Guri, Andrey Daidakulov, Yuval Elovici:
MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields. CoRR abs/1802.02317 (2018) - [i18]Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici:
ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields. CoRR abs/1802.02700 (2018) - [i17]Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication. CoRR abs/1803.03422 (2018) - [i16]Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici:
PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines. CoRR abs/1804.04014 (2018) - [i15]Mordechai Guri:
BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets. CoRR abs/1804.08714 (2018) - 2017
- [j1]Mordechai Guri, Matan Monitz, Yuval Elovici:
Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack. ACM Trans. Intell. Syst. Technol. 8(4): 50:1-50:25 (2017) - [c19]Mordechai Guri, Boris Zadov, Yuval Elovici:
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED. DIMVA 2017: 161-184 - [c18]Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration'). ESORICS (2) 2017: 98-115 - [c17]Mordechai Guri, Yisroel Mirsky, Yuval Elovici:
9-1-1 DDoS: Attacks, Analysis and Mitigation. EuroS&P 2017: 218-232 - [c16]Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit. WOOT 2017 - [i14]Mordechai Guri, Boris Zadov, Eran Atias, Yuval Elovici:
LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED. CoRR abs/1702.06715 (2017) - [i13]Yisroel Mirsky, Mordechai Guri, Yuval Elovici:
HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System. CoRR abs/1703.10454 (2017) - [i12]Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici:
xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs. CoRR abs/1706.01140 (2017) - [i11]Mordechai Guri, Dima Bykhovsky, Yuval Elovici:
aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR). CoRR abs/1709.05742 (2017) - 2016
- [c15]Mordechai Guri, Eyal Shemer, Dov Shirtz, Yuval Elovici:
Personal Information Leakage During Password Recovery of Internet Services. EISIC 2016: 136-139 - [c14]Mordechai Guri, Matan Monitz, Yuval Elovici:
AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling. FNSS 2016: 1-11 - [c13]Mordechai Guri, Matan Monitz, Yuval Elovici:
USBee: Air-gap covert-channel via electromagnetic emission from USB. PST 2016: 264-268 - [c12]Mordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici:
An optical covert-channel to leak data through an air-gap. PST 2016: 642-649 - [i10]Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers. CoRR abs/1606.05915 (2016) - [i9]Mordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici:
VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap. CoRR abs/1607.03946 (2016) - [i8]Mordechai Guri, Eyal Shemer, Dov Shirtz, Yuval Elovici:
Personal Information Leakage During Password Recovery of Internet Services. CoRR abs/1608.01492 (2016) - [i7]Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise. CoRR abs/1608.03431 (2016) - [i6]Mordechai Guri, Matan Monitz, Yuval Elovici:
USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB. CoRR abs/1608.08397 (2016) - [i5]Mordechai Guri, Yisroel Mirsky, Yuval Elovici:
9-1-1 DDoS: Threat, Analysis and Mitigation. CoRR abs/1609.02353 (2016) - [i4]Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit. CoRR abs/1611.07350 (2016) - 2015
- [c11]Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici:
BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. CSF 2015: 276-289 - [c10]Mordechai Guri, Yuri Poliak, Bracha Shapira
, Yuval Elovici:
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. TrustCom/BigDataSE/ISPA (1) 2015: 65-73 - [c9]Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, Yuval Elovici:
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. USENIX Security Symposium 2015: 849-864 - [i3]Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici:
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations. CoRR abs/1503.07919 (2015) - [i2]Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici:
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. CoRR abs/1512.04116 (2015) - 2014
- [c8]Mordechai Guri, Anatoly Krasner, Yuval Elovici:
Peers-Based Location of Mobile Devices. FCC 2014: 439-445 - [c7]Mordechai Guri, Gabi Kedma, Boris Zadov, Yuval Elovici:
Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements. JISIC 2014: 145-151 - [c6]Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici:
Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries. JISIC 2014: 152-159 - [c5]Vitali Sepetnitsky, Mordechai Guri, Yuval Elovici:
Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator. JISIC 2014: 264-267 - [c4]Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici:
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. MALWARE 2014: 58-67 - [c3]Mordechai Guri, Gabi Kedma, Buky Carmeli, Yuval Elovici:
Limiting access to unintentionally leaked sensitive documents using malware signatures. SACMAT 2014: 129-140 - [i1]Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici:
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies. CoRR abs/1411.0237 (2014) - 2013
- [c2]Gabi Kedma, Mordechai Guri, Tom Sela, Yuval Elovici:
Analyzing users' web surfing patterns to trace terrorists and criminals. ISI 2013: 143-145 - [c1]Mordechai Guri, Gabi Kedma, Tom Sela, Buky Carmeli, Amit Rosner, Yuval Elovici:
Noninvasive detection of anti-forensic malware. MALWARE 2013: 1-10
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint