This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Berghel, H. A Farewell to Air Gaps. Part 1. – Computer, Vol. 48, 2015, No 6, pp. 64-68.Search in Google Scholar
Berghel, H. A Farewell to Air Gaps. Part 2. – Computer, Vol. 48, 2015, No 7, pp. 59-63.Search in Google Scholar
Guri, M., Y. Elovici. Bridgeware. – Communications of the ACM, Vol. 61, 2018, No 4, pp. 74-82. Available: 10.1145/3177230.Search in Google Scholar
Guri, M., M. Monitz, Y. Mirski, Y. Elovici. BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. – In: Proc. of 28th IEEE Computer Security Foundations Symposium, 2015.Search in Google Scholar
Guri, M., D. Bykhovsky, Y. Elovici. Brightness: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness. – In: Proc. of 12th CMI Conference on Cybersecurity and Privacy (CMI’19), 2019.Search in Google Scholar
Guri, M. CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives. – In: Proc. of 44th IEEE Annual Computers, Software, and Applications Conference (COMPSAC’20), 2020.Search in Google Scholar
Guri, M., Y. Solewicz, Y. Elovici. Fansmitter: Acoustic Data Exfiltration from Air-Gapped Computers via Fans Noise. – Computers & Security, Vol. 91, 2020, 101721.Search in Google Scholar
Zhao, B., M. Ni, P. Fan. Powermitter: Data Exfiltration from Air-Gapped Computer through Switching Power Supply. – In: China Communications, Vol. 15, February 2018, No 2, pp. 170-189. DOI: 10.1109/CC.2018.8300280.Search in Google Scholar
Kasmi, C., J. L. Esteves, P. Valembois. Air-Gap Limitations and Bypass Techniques: “Command and Control” Using Smart Electromagnetic Interferences. – Le Journal de la Cybercriminalité & Des Investigations Numériques, Vol. 1, 2015, No 1, pp. 13-19.Search in Google Scholar
Kenta, Y., M. Hirose, T. Saito. Data Exfiltration from Air-Gapped Computers Based on ARM CPU. – International Journal of Advanced Computer Science and Applications, Vol. 9, 2018.Search in Google Scholar
Guri, M., A. Kachlon, O. Hasson, G. Kedma. GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. – In: Proc. of USENIX Security Symposium, 2015, pp. 849-864.Search in Google Scholar
Guri, M. MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields. – Future Generation Computer Systems, Vol. 115, 2021, pp. 115-125.Search in Google Scholar
Guri, M. AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers. – arXiv.org, 2021 (online). https://arxiv.org/abs/2012.06884.Search in Google Scholar
Guri, M., B. Zadov, Y. Elovici. ODINI: Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields. – IEEE Transactions on Information Forensics and Security, Vol. 15, 2020, pp. 1190-1203.Search in Google Scholar
Mirsky, Y., M. Guri, Y. Elovici. HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System. 2017 (online). https://www.researchgate.net/publication/315710328_HVACKer_Bridging_the_Air-Gap_by_Attacking_the_Air_Conditioning_System.Search in Google Scholar
Genkin, D., A. Shamir, E. Tromer. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. – In: Proc. of Advances in Cryptology (CRYPTO’14), 2014, pp. 444-461.Search in Google Scholar
Guri, M., B. Zadov, D. Bykhovsky, Y. Elovici. PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines – IEEE Transactions on Information Forensics and Security, Vol. 15, 2020, pp. 1879-1890.Search in Google Scholar
Keim, Y., A. Mohapatra. Cyber Threat Intelligence Framework Using Advanced Malware Forensics. – International Journal of Information Technology, 2019. Available: 10.1007/s41870-019-00280-3.Search in Google Scholar
Sharma, P., B. Nagpal. Regex: An Experimental Approach for Searching in Cyber Forensic. – International Journal of Information Technology, Vol. 12, 2019, No 2, pp. 339-343. Available: 10.1007/s41870-019-00401-y.Search in Google Scholar