A survey on air-gap attacks: Fundamentals, transport means, attack scenarios and challenges
J Park, J Yoo, J Yu, J Lee, JS Song - Sensors, 2023 - mdpi.com
Major public institutions and organizations that handle sensitive data frequently enforce
strong security policies by implementing network separation policies that segregates their …
strong security policies by implementing network separation policies that segregates their …
Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields
M Guri - Future Generation Computer Systems, 2021 - Elsevier
This papers shows that attackers can leak data from isolated, air-gapped computers to
nearby smartphones via covert magnetic signals. The proposed covert channel works even …
nearby smartphones via covert magnetic signals. The proposed covert channel works even …
The Malware as a Service ecosystem
The goal of this chapter is to illuminate the operational frameworks, key actors, and
significant cybersecurity implications of the malware as a service (MaaS) ecosystem …
significant cybersecurity implications of the malware as a service (MaaS) ecosystem …
Air-fi: Leaking data from air-gapped computers using wi-fi frequencies
M Guri - IEEE Transactions on Dependable and Secure …, 2022 - ieeexplore.ieee.org
This article presents a new attack allowing attackers to exfiltrate data from isolated, air-
gapped computers via Wi-Fi frequencies. We show that malware in a compromised air …
gapped computers via Wi-Fi frequencies. We show that malware in a compromised air …
POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers
M Guri - IEEE Transactions on Dependable and Secure …, 2021 - ieeexplore.ieee.org
In this article, we introduce a new covert channel that enables attackers to leak data
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …
Air-gap electromagnetic covert channel
M Guri - IEEE Transactions on Dependable and Secure …, 2023 - ieeexplore.ieee.org
Air-gapped systems are isolated from the Internet due to the sensitive information they
handle. This paper introduces a covert channel attack that leaks sensitive information over …
handle. This paper introduces a covert channel attack that leaks sensitive information over …
Exfiltrating data from air-gapped computers via ViBrAtIoNs
M Guri - Future Generation Computer Systems, 2021 - Elsevier
Air-gap covert channels are special types of covert communication channels that enable
attackers to exfiltrate data from isolated, network-less computers. Various types of air-gap …
attackers to exfiltrate data from isolated, network-less computers. Various types of air-gap …
CD-LEAK: Leaking secrets from audioless air-gapped computers using covert acoustic signals from CD/DVD drives
M Guri - 2020 IEEE 44th Annual Computers, Software, and …, 2020 - ieeexplore.ieee.org
Air-gapped networks are isolated from the Internet, since they store and process sensitive
information. It has been shown that attackers can exfiltrate data from air-gapped networks by …
information. It has been shown that attackers can exfiltrate data from air-gapped networks by …
Gaming the system: tetromino-based covert channel and its impact on mobile security
E Vasilellis, V Botsos, A Anagnostopoulou… - International Journal of …, 2024 - Springer
Trojan droppers consistently emerge as challenging malware threats, particularly within the
Android ecosystem. Traditional malware detection approaches focus on identifying payloads …
Android ecosystem. Traditional malware detection approaches focus on identifying payloads …
Usbculprit: Usb-borne air-gap malware
M Guri - Proceedings of the 2021 European Interdisciplinary …, 2021 - dl.acm.org
Air-gapped networks are disconnected from the Internet due to the sensitive data they store
and process. These networks are usually maintained by military organizations, defense …
and process. These networks are usually maintained by military organizations, defense …