ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1503.07919
  4. Cited By
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using
  Thermal Manipulations

BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations

IEEE Computer Security Foundations Symposium (CSF), 2015
26 March 2015
Mordechai Guri
Matan Monitz
Yisroel Mirsky
Yuval Elovici
ArXiv (abs)PDFHTML

Papers citing "BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations"

42 / 42 papers shown
SmartAttack: Air-Gap Attack via SmartwatchesAnnual International Computer Software and Applications Conference (COMPSAC), 2025
Mordechai Guri
AAML
130
0
0
10 Jun 2025
PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via
  `Singing Pixels'
PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via `Singing Pixels'Annual International Computer Software and Applications Conference (COMPSAC), 2024
Mordechai Guri
361
2
0
07 Sep 2024
CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN
CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN
Simone Soderi
R. Nicola
173
5
0
24 Apr 2024
DYST (Did You See That?): An Amplified Covert Channel That Points To
  Previously Seen Data
DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen DataIEEE Transactions on Dependable and Secure Computing (TDSC), 2022
S. Wendzel
Tobias Schmidbauer
S. Zillien
J. Keller
305
6
0
22 Dec 2022
COVID-bit: Keep a Distance of (at least) 2m From My Air-Gap Computer!
COVID-bit: Keep a Distance of (at least) 2m From My Air-Gap Computer!
Mordechai Guri
146
2
0
07 Dec 2022
Let's Talk Through Physics! Covert Cyber-Physical Data Exfiltration on
  Air-Gapped Edge Devices
Let's Talk Through Physics! Covert Cyber-Physical Data Exfiltration on Air-Gapped Edge Devices
Matthew Chan
Nathaniel Snyder
Marcus Lucas
L. Garcia
O. Sokolsky
James Weimer
Insup Lee
Paulo Tabuada
S. Zonouz
Mani B. Srivastava
114
1
0
14 Oct 2022
ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via
  Network Card (NIC) LEDs
ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDsComputer Science Symposium in Russia (CSR), 2022
Mordechai Guri
189
8
0
21 Aug 2022
GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby
  Gyroscopes
GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby GyroscopesConference on Privacy, Security and Trust (PST), 2021
Mordechai Guri
304
9
0
21 Aug 2022
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA CablesConference on Privacy, Security and Trust (PST), 2022
Mordechai Guri
104
8
0
15 Jul 2022
LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables
LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables
Mordechai Guri
186
8
0
30 Sep 2021
LaserShark: Establishing Fast, Bidirectional Communication into
  Air-Gapped Systems
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped SystemsAsia-Pacific Computer Systems Architecture Conference (ACSA), 2021
Niclas Kühnapfel
S. Preussler
Maximilian Noppel
T. Schneider
Konrad Rieck
Christian Wressnegger
205
5
0
08 Jun 2021
AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers
AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers
Mordechai Guri
120
9
0
12 Dec 2020
Human $\neq$ AGI
Human ≠\neq= AGI
Roman V. Yampolskiy
AI4CE
227
1
0
11 Jul 2020
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the
  Power-Supplies Into Speakers
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into SpeakersIACR Cryptology ePrint Archive (IACR ePrint), 2020
Mordechai Guri
161
17
0
01 May 2020
AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert
  Surface ViBrAtIoNs
AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs
Mordechai Guri
128
14
0
13 Apr 2020
BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via
  Screen Brightness
BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen BrightnessIEEE International Conference on Control, Measurement and Instrumentation (ICCMI), 2019
Mordechai Guri
Dima Bykhovsky
Yuval Elovici
255
30
0
04 Feb 2020
Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data
  Exfiltration from Desktop Computers
Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop ComputersMeasurement and Modeling of Computer Systems (SIGMETRICS), 2020
Zhihui Shao
Mohammad A. Islam
Shaolei Ren
143
14
0
18 Jan 2020
Covert Association of Applications on Edge Devices by Processor Workload
Covert Association of Applications on Edge Devices by Processor Workload
Hangtai Li
Yingbo Liu
Rui Tan
214
0
0
05 Jan 2020
Mice and Covert Channels
Mice and Covert Channels
Weeam Alshangiti
Rafid Saad
94
0
0
04 Nov 2019
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDsAnnual International Computer Software and Applications Conference (COMPSAC), 2019
Mordechai Guri
B. Zadov
Dima Bykhovsky
Yuval Elovici
AAML
153
41
0
10 Jul 2019
("Oops! Had the silly thing in reverse")---Optical injection attacks in
  through LED status indicators
("Oops! Had the silly thing in reverse")---Optical injection attacks in through LED status indicatorsInternational Conference on Embedded and Multimedia Computing (ICEMC), 2019
J. Loughry
AAML
172
6
0
30 Jun 2019
ConTExT: Leakage-Free Transient Execution
ConTExT: Leakage-Free Transient Execution
Michael Schwarz
R. Schilling
F. Kargl
Moritz Lipp
Claudio Canella
Daniel Gruss
177
21
0
22 May 2019
NetSpectre: Read Arbitrary Memory over Network
NetSpectre: Read Arbitrary Memory over Network
Michael Schwarz
Martin Schwarzl
Moritz Lipp
Daniel Gruss
212
250
0
27 Jul 2018
BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets
BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets
Mordechai Guri
256
43
0
23 Apr 2018
PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power
  Lines
PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines
Mordechai Guri
B. Zadov
Dima Bykhovsky
Yuval Elovici
166
93
0
10 Apr 2018
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped
  Computers using Speaker-to-Speaker Communication
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication
Mordechai Guri
Y. Solewicz
Andrey Daidakulov
Yuval Elovici
323
66
0
09 Mar 2018
ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers
  via Magnetic Fields
ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields
Mordechai Guri
B. Zadov
Andrey Daidakulov
Yuval Elovici
206
86
0
08 Feb 2018
MAGNETO: Covert Channel between Air-Gapped Systems and Nearby
  Smartphones via CPU-Generated Magnetic Fields
MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields
Mordechai Guri
Andrey Daidakulov
Yuval Elovici
204
65
0
07 Feb 2018
IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote
  Control Signals
IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals
Zheng Zhou
Weiming Zhang
Nenghai Yu
198
21
0
10 Jan 2018
How to find a GSMem malicious activity via an AI approach
How to find a GSMem malicious activity via an AI approach
Weijun Zhu
ShaoHuan Ban
Yongwen Fan
145
1
0
08 Jan 2018
Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status
  Indicators
Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators
Zheng Zhou
Weiming Zhang
Zichong Yang
Nenghai Yu
150
18
0
09 Nov 2017
aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security
  Cameras & Infrared (IR)
aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR)
Mordechai Guri
Dima Bykhovsky
Yuval Elovici
196
78
0
18 Sep 2017
xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs
xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs
Mordechai Guri
B. Zadov
Andrey Daidakulov
Yuval Elovici
200
31
0
04 Jun 2017
Aiming to Detect a malware of GSM frequency
Aiming to Detect a malware of GSM frequency
Weijun Zhu
Kai Nie
69
1
0
13 May 2017
HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System
HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System
Yisroel Mirsky
Mordechai Guri
Yuval Elovici
122
18
0
30 Mar 2017
Oops!...I think I scanned a malware
Oops!...I think I scanned a malware
Ben Nassi
A. Shamir
Yuval Elovici
122
13
0
22 Mar 2017
LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the
  (small) Hard Drive LED
LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LEDInternational Conference on Detection of intrusions and malware, and vulnerability assessment (DIMVA), 2017
Mordechai Guri
B. Zadov
Eran Atias
Yuval Elovici
180
117
0
22 Feb 2017
USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB
USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB
Mordechai Guri
Matan Monitz
Yuval Elovici
348
140
0
30 Aug 2016
DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers
  via Covert Hard Drive Noise
DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise
Mordechai Guri
Y. Solewicz
Andrey Daidakulov
Yuval Elovici
201
20
0
11 Aug 2016
VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap
VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap
Mordechai Guri
Ofer Hasson
Gabi Kedma
Yuval Elovici
264
78
0
13 Jul 2016
Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped
  Computers
Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers
Mordechai Guri
Y. Solewicz
Andrey Daidakulov
Yuval Elovici
210
72
0
19 Jun 2016
Grokya: a Privacy-Friendly Framework for Ubiquitous Computing
Grokya: a Privacy-Friendly Framework for Ubiquitous Computing
D. Farinha
80
0
0
12 Feb 2016
1
Page 1 of 1