Have a personal or library account? Click to login
Analysis on Hacking the Secured Air-Gapped Computer and Possible Solution Cover

Analysis on Hacking the Secured Air-Gapped Computer and Possible Solution

By: Vrinda Sati and  Raja Muthalagu  
Open Access
|Jun 2023

References

  1. Berghel, H. A Farewell to Air Gaps. Part 1. – Computer, Vol. 48, 2015, No 6, pp. 64-68.
  2. Berghel, H. A Farewell to Air Gaps. Part 2. – Computer, Vol. 48, 2015, No 7, pp. 59-63.
  3. Guri, M., Y. Elovici. Bridgeware. – Communications of the ACM, Vol. 61, 2018, No 4, pp. 74-82. Available: 10.1145/3177230.
  4. Guri, M., M. Monitz, Y. Mirski, Y. Elovici. BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. – In: Proc. of 28th IEEE Computer Security Foundations Symposium, 2015.
  5. Guri, M., D. Bykhovsky, Y. Elovici. Brightness: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness. – In: Proc. of 12th CMI Conference on Cybersecurity and Privacy (CMI’19), 2019.
  6. Guri, M. CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives. – In: Proc. of 44th IEEE Annual Computers, Software, and Applications Conference (COMPSAC’20), 2020.
  7. Guri, M., Y. Solewicz, Y. Elovici. Fansmitter: Acoustic Data Exfiltration from Air-Gapped Computers via Fans Noise. – Computers & Security, Vol. 91, 2020, 101721.
  8. Zhao, B., M. Ni, P. Fan. Powermitter: Data Exfiltration from Air-Gapped Computer through Switching Power Supply. – In: China Communications, Vol. 15, February 2018, No 2, pp. 170-189. DOI: 10.1109/CC.2018.8300280.
  9. Kasmi, C., J. L. Esteves, P. Valembois. Air-Gap Limitations and Bypass Techniques: “Command and Control” Using Smart Electromagnetic Interferences. – Le Journal de la Cybercriminalité & Des Investigations Numériques, Vol. 1, 2015, No 1, pp. 13-19.
  10. Kenta, Y., M. Hirose, T. Saito. Data Exfiltration from Air-Gapped Computers Based on ARM CPU. – International Journal of Advanced Computer Science and Applications, Vol. 9, 2018.
  11. Guri, M., A. Kachlon, O. Hasson, G. Kedma. GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. – In: Proc. of USENIX Security Symposium, 2015, pp. 849-864.
  12. Guri, M. MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields. – Future Generation Computer Systems, Vol. 115, 2021, pp. 115-125.
  13. Guri, M. AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers. – arXiv.org, 2021 (online). https://arxiv.org/abs/2012.06884.
  14. Guri, M., B. Zadov, Y. Elovici. ODINI: Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields. – IEEE Transactions on Information Forensics and Security, Vol. 15, 2020, pp. 1190-1203.
  15. Mirsky, Y., M. Guri, Y. Elovici. HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System. 2017 (online). https://www.researchgate.net/publication/315710328_HVACKer_Bridging_the_Air-Gap_by_Attacking_the_Air_Conditioning_System.
  16. Genkin, D., A. Shamir, E. Tromer. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. – In: Proc. of Advances in Cryptology (CRYPTO’14), 2014, pp. 444-461.
  17. Guri, M., B. Zadov, D. Bykhovsky, Y. Elovici. PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines – IEEE Transactions on Information Forensics and Security, Vol. 15, 2020, pp. 1879-1890.
  18. Keim, Y., A. Mohapatra. Cyber Threat Intelligence Framework Using Advanced Malware Forensics. – International Journal of Information Technology, 2019. Available: 10.1007/s41870-019-00280-3.
  19. Sharma, P., B. Nagpal. Regex: An Experimental Approach for Searching in Cyber Forensic. – International Journal of Information Technology, Vol. 12, 2019, No 2, pp. 339-343. Available: 10.1007/s41870-019-00401-y.
DOI: https://doi.org/10.2478/cait-2023-0017 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 124 - 136
Submitted on: Jul 19, 2022
Accepted on: Apr 14, 2023
Published on: Jun 12, 2023
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2023 Vrinda Sati, Raja Muthalagu, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.