Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

State of the Art in Israeli Rootkit Design

Name: Anonymous 2015-05-28 11:35

BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations
By Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici. Department of Information Systems Engineering, Ben-Gurion University, Beer-Sheva, Israel.

http://arxiv.org/abs/1503.07919

It has been assumed that the physical separation (air-gap) of computers provides a reliable level of security, such that should two adjacent computers become compromised, the covert exchange of data between them would be impossible. In this paper, we demonstrate BitWhisper, a method of bridging the air-gap between adjacent compromised computers by using their heat emissions and built-in thermal sensors to create a covert communication channel. Our method is unique in two respects: it supports bidirectional communication, and it requires no additional dedicated peripheral hardware. We provide experimental results based on implementation of BitWhisper prototype, and examine the channel properties and limitations. Our experiments included different layouts, with computers positioned at varying distances from one another, and several sensor types and CPU configurations (e.g., Virtual Machines). We also discuss signal modulation and communication protocols, showing how BitWhisper can be used for the exchange of data between two computers in a close proximity (at distance of 0-40cm) at an effective rate of 1-8 bits per hour, a rate which makes it possible to infiltrate brief commands and exfiltrate small amount of data (e.g., typical goyische passwords) over the covert channel.

Name: Anonymous 2015-05-28 14:13

/security/

Name: Anonymous 2015-05-28 15:17

1-8 bits per hour

And easily defeated with better cooling (or heating) systems...

Name: Anonymous 2015-05-28 16:00

That is what I call "thinking outside the box".

Name: Anonymous 2015-05-28 18:41

small amount of data (e.g., typical goyische passwords)

I really hope for the destruction of the state of Israel.

Name: Anonymous 2015-05-28 18:54

Matan Monitz

His parents named him after mathematical analysis? I guess he was predestined to do math right from birth, lol. No freedom, not for you, little Jew.

Name: Anonymous 2015-05-28 19:34

>>6
I guess the editor has mistyped "Natan" for "Matan".

Name: Anonymous 2015-05-28 19:44

This is silly.

Name: Anonymous 2015-06-01 11:18

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis

Authors: some kikes in Israhell.

http://www.tau.ac.il/~tromer/acoustic/

Pwnie for Most Innovative Research

Awarded to the person who published the most interesting and innovative research in the form of a paper, presentation, tool or even a mailing list post.

This research won the Black Hat 2014 Pwnie Award for Most Innovative Research.

Name: Anonymous 2015-06-01 15:54

Ben-Garrison University

Name: Anonymous 2015-06-01 22:15

>>10
Whom are you quoting?

Don't change these.
Name: Email:
Entire Thread Thread List