A survey on air-gap attacks: Fundamentals, transport means, attack scenarios and challenges

J Park, J Yoo, J Yu, J Lee, JS Song - Sensors, 2023 - mdpi.com
Major public institutions and organizations that handle sensitive data frequently enforce
strong security policies by implementing network separation policies that segregates their …

Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields

M Guri - Future Generation Computer Systems, 2021 - Elsevier
This papers shows that attackers can leak data from isolated, air-gapped computers to
nearby smartphones via covert magnetic signals. The proposed covert channel works even …

The Malware as a Service ecosystem

C Patsakis, D Arroyo, F Casino - Malware: Handbook of Prevention and …, 2024 - Springer
The goal of this chapter is to illuminate the operational frameworks, key actors, and
significant cybersecurity implications of the malware as a service (MaaS) ecosystem …

Air-fi: Leaking data from air-gapped computers using wi-fi frequencies

M Guri - IEEE Transactions on Dependable and Secure …, 2022 - ieeexplore.ieee.org
This article presents a new attack allowing attackers to exfiltrate data from isolated, air-
gapped computers via Wi-Fi frequencies. We show that malware in a compromised air …

POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers

M Guri - IEEE Transactions on Dependable and Secure …, 2021 - ieeexplore.ieee.org
In this article, we introduce a new covert channel that enables attackers to leak data
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …

Air-gap electromagnetic covert channel

M Guri - IEEE Transactions on Dependable and Secure …, 2023 - ieeexplore.ieee.org
Air-gapped systems are isolated from the Internet due to the sensitive information they
handle. This paper introduces a covert channel attack that leaks sensitive information over …

Exfiltrating data from air-gapped computers via ViBrAtIoNs

M Guri - Future Generation Computer Systems, 2021 - Elsevier
Air-gap covert channels are special types of covert communication channels that enable
attackers to exfiltrate data from isolated, network-less computers. Various types of air-gap …

CD-LEAK: Leaking secrets from audioless air-gapped computers using covert acoustic signals from CD/DVD drives

M Guri - 2020 IEEE 44th Annual Computers, Software, and …, 2020 - ieeexplore.ieee.org
Air-gapped networks are isolated from the Internet, since they store and process sensitive
information. It has been shown that attackers can exfiltrate data from air-gapped networks by …

Gaming the system: tetromino-based covert channel and its impact on mobile security

E Vasilellis, V Botsos, A Anagnostopoulou… - International Journal of …, 2024 - Springer
Trojan droppers consistently emerge as challenging malware threats, particularly within the
Android ecosystem. Traditional malware detection approaches focus on identifying payloads …

Usbculprit: Usb-borne air-gap malware

M Guri - Proceedings of the 2021 European Interdisciplinary …, 2021 - dl.acm.org
Air-gapped networks are disconnected from the Internet due to the sensitive data they store
and process. These networks are usually maintained by military organizations, defense …