Acceso abierto

Analysis on Hacking the Secured Air-Gapped Computer and Possible Solution


Cite

Berghel, H. A Farewell to Air Gaps. Part 1. – Computer, Vol. 48, 2015, No 6, pp. 64-68. Search in Google Scholar

Berghel, H. A Farewell to Air Gaps. Part 2. – Computer, Vol. 48, 2015, No 7, pp. 59-63. Search in Google Scholar

Guri, M., Y. Elovici. Bridgeware. – Communications of the ACM, Vol. 61, 2018, No 4, pp. 74-82. Available: 10.1145/3177230. Search in Google Scholar

Guri, M., M. Monitz, Y. Mirski, Y. Elovici. BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. – In: Proc. of 28th IEEE Computer Security Foundations Symposium, 2015. Search in Google Scholar

Guri, M., D. Bykhovsky, Y. Elovici. Brightness: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness. – In: Proc. of 12th CMI Conference on Cybersecurity and Privacy (CMI’19), 2019. Search in Google Scholar

Guri, M. CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives. – In: Proc. of 44th IEEE Annual Computers, Software, and Applications Conference (COMPSAC’20), 2020. Search in Google Scholar

Guri, M., Y. Solewicz, Y. Elovici. Fansmitter: Acoustic Data Exfiltration from Air-Gapped Computers via Fans Noise. – Computers & Security, Vol. 91, 2020, 101721. Search in Google Scholar

Zhao, B., M. Ni, P. Fan. Powermitter: Data Exfiltration from Air-Gapped Computer through Switching Power Supply. – In: China Communications, Vol. 15, February 2018, No 2, pp. 170-189. DOI: 10.1109/CC.2018.8300280. Search in Google Scholar

Kasmi, C., J. L. Esteves, P. Valembois. Air-Gap Limitations and Bypass Techniques: “Command and Control” Using Smart Electromagnetic Interferences. – Le Journal de la Cybercriminalité & Des Investigations Numériques, Vol. 1, 2015, No 1, pp. 13-19. Search in Google Scholar

Kenta, Y., M. Hirose, T. Saito. Data Exfiltration from Air-Gapped Computers Based on ARM CPU. – International Journal of Advanced Computer Science and Applications, Vol. 9, 2018. Search in Google Scholar

Guri, M., A. Kachlon, O. Hasson, G. Kedma. GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. – In: Proc. of USENIX Security Symposium, 2015, pp. 849-864. Search in Google Scholar

Guri, M. MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields. – Future Generation Computer Systems, Vol. 115, 2021, pp. 115-125. Search in Google Scholar

Guri, M. AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers. – arXiv.org, 2021 (online). https://arxiv.org/abs/2012.06884. Search in Google Scholar

Guri, M., B. Zadov, Y. Elovici. ODINI: Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields. – IEEE Transactions on Information Forensics and Security, Vol. 15, 2020, pp. 1190-1203. Search in Google Scholar

Mirsky, Y., M. Guri, Y. Elovici. HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System. 2017 (online). https://www.researchgate.net/publication/315710328_HVACKer_Bridging_the_Air-Gap_by_Attacking_the_Air_Conditioning_System. Search in Google Scholar

Genkin, D., A. Shamir, E. Tromer. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. – In: Proc. of Advances in Cryptology (CRYPTO’14), 2014, pp. 444-461. Search in Google Scholar

Guri, M., B. Zadov, D. Bykhovsky, Y. Elovici. PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines – IEEE Transactions on Information Forensics and Security, Vol. 15, 2020, pp. 1879-1890. Search in Google Scholar

Keim, Y., A. Mohapatra. Cyber Threat Intelligence Framework Using Advanced Malware Forensics. – International Journal of Information Technology, 2019. Available: 10.1007/s41870-019-00280-3. Search in Google Scholar

Sharma, P., B. Nagpal. Regex: An Experimental Approach for Searching in Cyber Forensic. – International Journal of Information Technology, Vol. 12, 2019, No 2, pp. 339-343. Available: 10.1007/s41870-019-00401-y. Search in Google Scholar

eISSN:
1314-4081
Idioma:
Inglés
Calendario de la edición:
4 veces al año
Temas de la revista:
Computer Sciences, Information Technology