Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs., , , and . COMPSAC (1), page 801-810. IEEE, (2019)ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields., , , and . CoRR, (2018)xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs., , , and . CoRR, (2017)Optical Speech Recovery From Desktop Speakers., , , , , and . Computer, 55 (11): 40-51 (2022)PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines., , , and . CoRR, (2018)PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines., , , and . IEEE Trans. Inf. Forensics Secur., (2020)ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields., , and . IEEE Trans. Inf. Forensics Secur., (2020)Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED., , , , and . CCS, page 1900-1914. ACM, (2021)LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED., , , and . CoRR, (2017)LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED., , and . DIMVA, volume 10327 of Lecture Notes in Computer Science, page 161-184. Springer, (2017)