AIR-GAP RESEARCH
This website is dedicated to air-gap jumping academic research
By Dr. Mordechai Guri
Head of Offensive-Cyber Research Lab
Software and Information Systems Engineering (SISE)
Ben-Gurion University of the Negev, Israel
email: gurim@post.bgu.ac.il
WIRED: https://www.wired.com/story/air-gap-researcher-mordechai-guri/
Selected publications below
BlackHat USA: M. Guri, "The Air-Gap Jumpers” (video: https://www.youtube.com/watch?v=YKRtFgunyj4)
M. Guri, “PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via ‘Singing Pixels’” 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)
Demo video: https://www.instagram.com/reel/C_0Osn6JwHJ/
M. Guri, “RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM” Nordic Conference on Secure IT Systems
RAMBO = (Radiation of Air-gapped Memory Bus for Offense)
Demo video: https://youtu.be/BLJcUXd2ny
Research Coverage video from "low Level Learning: https://www.youtube.com/watch?v=ihtAijebU-M
(http://arxiv.org/abs/2409.02292)
M. Guri, “Air-Gap Electromagnetic Covert Channel” IEEE Transactions on Dependable and Secure Computing, 2023.
M. Guri, “AirKeyLogger: Hardwareless Air-Gap Keylogging Attack” in 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC), 2023, pp. 637–647.
M. Guri, “Near Field Air-Gap Covert Channel Attack” in 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2022, pp. 490–497.
M. Guri, “GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans” in Nordic Conference on Secure IT Systems, 2022, pp. 194–211.
M. Guri, “COVID-bit: Keep a Distance of (at least) 2m From My Air-Gap Computer!” arXiv preprint arXiv:2212.03520, 2022.
Demo video: https://youtu.be/96eMLEIA57Q
M. Guri, “ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDs” in 2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022, pp. 163–170.
Demo video: https://www.youtube.com/watch?v=acYAPMr_JZg
M. Guri, “SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables” in 2022 19th Annual International Conference on Privacy, Security & Trust (PST), 2022, pp. 1–10.
Demo video: https://www.youtube.com/watch?v=rlmP-csuFIo
M. Guri, “AIR-FI: Leaking Data from Air-Gapped Computers Using Wi-Fi Frequencies,” IEEE Transactions on Dependable and Secure Computing, 2022.
Demo video: https://www.youtube.com/watch?v=vhNnc0ln63c
M. Guri, “Gairoscope: Leaking data from air-gapped computers to nearby smartphones using speakers-to-gyro communication” in 2021 18th International Conference on Privacy, Security and Trust (PST), 2021, pp. 1–10.
Demo video: https://youtu.be/5sUQ0jG01dw
M. Guri, “Power-supplay: Leaking sensitive data from air-gapped, audio-gapped systems by turning the power supplies into speakers,” IEEE Transactions on Dependable and Secure Computing, 2021.
M. Guri, “Usbculprit: Usb-borne air-gap malware” in European Interdisciplinary Cybersecurity Conference, 2021, pp. 7–13.
M. Guri, “Lantenna: Exfiltrating data from air-gapped networks via ethernet cables emission” in 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 2021, pp. 745–754.
Demo video: https://youtu.be/-X2Mb5HWE44
M. Guri, “Exfiltrating data from air-gapped computers via ViBrAtIoNs” Future Generation Computer Systems, vol. 122, pp. 69–81, 2021.
Demo video: https://youtu.be/XGD343nq1dg
M. Guri, “MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields” Future Generation Computer Systems, vol. 115, pp. 115–125.
Demo video: https://www.youtube.com/watch?v=yz8E5n1Tzlo
M. Guri, “CD-LEAK: Leaking secrets from audioless air-gapped computers using covert acoustic signals from CD/DVD drives” in 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), 2020, pp. 808–816.
M. Guri, O. Hasson, G. Kedma, and Y. Elovici, “VisiSploit: An optical covert-channel to leak data through an air-gap” arXiv preprint arXiv:1607.03946, 2016.
M. Guri, “HOTSPOT: Crossing the air-gap between isolated pcs and nearby smartphones using temperature” in 2019 European Intelligence and Security Informatics Conference (EISIC), 2019, pp. 94–100.
M. Guri, Y. Solewicz, and Y. Elovici, “Speaker-to-speaker covert ultrasonic communication” Journal of Information Security and Applications, vol. 51, p. 102458, 2020.
M. Guri, Y. Solewicz, and Y. Elovici, “Fansmitter: Acoustic data exfiltration from air-gapped computers via fans noise” Computers & Security, vol. 91, p. 101721, 2020.
Demo video: https://www.youtube.com/watch?v=v2_sZIfZkDQ
M. Guri, D. Bykhovsky, and Y. Elovici, “Brightness: Leaking sensitive data from air-gapped workstations via screen brightness” in 2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 2019, pp. 1–6.
Demo Video: https://youtu.be/ZrkZUO2g4DE
(In this demo, the screen secretly exfiltrate the text of "Winnie-the-Pooh" by A.A. Milne)
M. Guri, B. Zadov, D. Bykhovsky, and Y. Elovici, “Ctrl-alt-led: Leaking data from air-gapped computers via keyboard leds” in 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019, vol. 1, pp. 801–810.
Demo video: https://youtu.be/1kBGDHVr7x0
M. Guri, “Optical covert channel from air-gapped networks via remote orchestration of router/switch LEDs” in 2018 European Intelligence and Security Informatics Conference (EISIC), 2018, pp. 54–60.
M. Guri, “Optical air-gap exfiltration attack via invisible images” Journal of Information Security and Applications, vol. 46, pp. 222–230, 2019.
M. Guri and M. Monitz, “Lcd tempest air-gap attack reloaded” in 2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE), 2018, pp. 1–5.
M. Guri, B. Zadov, A. Daidakulov, and Y. Elovici, “xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs” in 2018 16th Annual Conference on Privacy, Security and Trust (PST), 2018, pp. 1–12.
Demo video: https://www.youtube.com/watch?v=mSNt4h7EDKo
M. Guri, “Beatcoin: Leaking private keys from air-gapped cryptocurrency wallets,” in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018, pp. 1308–1316.
Demo video: https://youtu.be/ddmHOvT866o
M. Guri, B. Zadov, D. Bykhovsky, and Y. Elovici, “PowerHammer: Exfiltrating data from air-gapped computers through power lines” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1879–1890, 2019.
M. Guri and Y. Elovici, “Bridgeware: The air-gap malware” Communications of the ACM, vol. 61, no. 4, pp. 74–82, 2018.
M. Guri, Y. Solewicz, and Y. Elovici, “Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication” in 2018 IEEE Conference on Dependable and Secure Computing (DSC), 2018, pp. 1–8.
Demo video: https://www.youtube.com/watch?v=ZD8CNxYe5dk
M. Guri, B. Zadov, and Y. Elovici, “Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1190–1203, 2019.
Demo video: https://www.youtube.com/watch?v=h07iXD-aSCA
M. Guri and D. Bykhovsky, “air-jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (ir),” Computers & Security, vol. 82, pp. 15–29, 2019.
Demo video: https://www.youtube.com/watch?v=auoYKSzdOj4
M. Guri, Y. Solewicz, A. Daidakulov, and Y. Elovici, “Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise (‘DiskFiltration’),” in Computer Security–ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II 22, 2017, pp. 98–115.
Demo video: https://www.youtube.com/watch?v=H7lQXmSLiP8
M. Guri, B. Zadov, and Y. Elovici, “LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED.,” in DIMVA 2017. Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, 2017, pp. 161–184.
Demo video: https://www.youtube.com/watch?v=4vIu8ld68fc
M. Guri, Y. Solewicz, A. Daidakulov, and Y. Elovici, “SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit” 2017.
Demo video: https://www.youtube.com/watch?v=ez3o8aIZCDM
M. Guri, M. Monitz, and Y. Elovici, “Bridging the air gap between isolated networks and mobile phones in a practical cyber-attack” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 8, no. 4, pp. 1–25, 2017.
M. Guri, O. Hasson, G. Kedma, and Y. Elovici, “An optical covert-channel to leak data through an air-gap,” in 2016 14th annual conference on privacy, security and trust (pst), 2016, pp. 642–649.
Y. Mirsky, M. Guri, and Y. Elovici, “Hvacker: Bridging the air-gap by attacking the air conditioning system,” arXiv preprint arXiv:1703.10454, 2017.
M. Guri, M. Monitz, and Y. Elovici, “USBee: Air-gap covert-channel via electromagnetic emission from USB,” in 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, pp. 264–268.
Demo video: https://www.youtube.com/watch?v=E28V1t-k8Hk
M. Guri, A. Kachlon, O. Hasson, G. Kedma, Y. Mirsky, and Y. Elovici, “{GSMem}: Data exfiltration from {Air-Gapped} computers over {GSM} frequencies,” in 24th USENIX Security Symposium (USENIX Security 15), 2015, pp. 849–864.
Demo video: https://www.youtube.com/watch?v=RChj7Mg3rC4
V. Sepetnitsky, M. Guri, and Y. Elovici, “Exfiltration of information from air-gapped machines using monitor’s LED indicator,” in 2014 IEEE Joint Intelligence and Security Informatics Conference, 2014, pp. 264–267.
M. Guri, M. Monitz, Y. Mirski, and Y. Elovici, “Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations,” in 2015 IEEE 28th Computer Security Foundations Symposium, 2015, pp. 276–289.
Demo video: https://www.youtube.com/watch?v=EWRk51oB-1Y&t=15s
M. Guri, G. Kedma, A. Kachlon, and Y. Elovici, “AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies,” in 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE), 2014, pp. 58–67.
Demo video: https://www.youtube.com/watch?v=2OzTWiGl1rM&t=20s
M. Guri, “PrinterLeak: Leaking Sensitive Data by Exploiting Printer Display Panels,” in International Conference on Computational Science and Its Applications, 2023, pp. 202–217.