ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2002.01078
  4. Cited By
BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via
  Screen Brightness

BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness

4 February 2020
Mordechai Guri
Dima Bykhovsky
Yuval Elovici
ArXivPDFHTML

Papers citing "BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness"

18 / 18 papers shown
Title
PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via
  `Singing Pixels'
PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via `Singing Pixels'
Mordechai Guri
135
0
0
07 Sep 2024
Information Leakage from Optical Emanations
Information Leakage from Optical Emanations
J. Loughry
D. Umphress
43
186
0
13 Jul 2023
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs
Mordechai Guri
B. Zadov
Dima Bykhovsky
Yuval Elovici
AAML
30
39
0
10 Jul 2019
Data Exfiltration via Multipurpose RFID Cards and Countermeasures
Data Exfiltration via Multipurpose RFID Cards and Countermeasures
Zheng Zhou
Weiming Zhang
Nenghai Yu
36
3
0
02 Feb 2019
Optical TEMPEST
Optical TEMPEST
J. Loughry
31
8
0
22 Aug 2018
PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power
  Lines
PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines
Mordechai Guri
B. Zadov
Dima Bykhovsky
Yuval Elovici
47
79
0
10 Apr 2018
ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers
  via Magnetic Fields
ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields
Mordechai Guri
B. Zadov
Andrey Daidakulov
Yuval Elovici
51
75
0
08 Feb 2018
MAGNETO: Covert Channel between Air-Gapped Systems and Nearby
  Smartphones via CPU-Generated Magnetic Fields
MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields
Mordechai Guri
Andrey Daidakulov
Yuval Elovici
35
57
0
07 Feb 2018
IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote
  Control Signals
IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals
Zheng Zhou
Weiming Zhang
Nenghai Yu
49
21
0
10 Jan 2018
aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security
  Cameras & Infrared (IR)
aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR)
Mordechai Guri
Dima Bykhovsky
Yuval Elovici
39
69
0
18 Sep 2017
LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the
  (small) Hard Drive LED
LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Mordechai Guri
B. Zadov
Eran Atias
Yuval Elovici
42
113
0
22 Feb 2017
USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB
USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB
Mordechai Guri
Matan Monitz
Yuval Elovici
34
125
0
30 Aug 2016
VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap
VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap
Mordechai Guri
Ofer Hasson
Gabi Kedma
Yuval Elovici
43
76
0
13 Jul 2016
Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped
  Computers
Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers
Mordechai Guri
Y. Solewicz
Andrey Daidakulov
Yuval Elovici
41
67
0
19 Jun 2016
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using
  Thermal Manipulations
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations
Mordechai Guri
Matan Monitz
Yisroel Mirsky
Yuval Elovici
53
166
0
26 Mar 2015
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile
  Phones using Radio Frequencies
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies
Mordechai Guri
Gabi Kedma
Assaf Kachlon
Yuval Elovici
40
145
0
02 Nov 2014
On Covert Acoustical Mesh Networks in Air
On Covert Acoustical Mesh Networks in Air
Michael Hanspach
M. Goetz
57
172
0
04 Jun 2014
Shoulder Surfing attack in graphical password authentication
Shoulder Surfing attack in graphical password authentication
Arash Habibi Lashkari
Samaneh Farmand
O. Zakaria
Rosli Saleh
74
147
0
04 Dec 2009
1