Abstract:Information is the most critical asset of modern organizations, and accordingly coveted by adversaries. When highly sensitive data is involved, an organization may resort to air-gap isolation, in which there is no networking connection between the inner network and the external world. While infiltrating an air-gapped network has been proven feasible in recent years (e.g., Stuxnet), data exfiltration from an air-gapped network is still considered to be one of the most challenging phases of an advanced cyberatta… Show more
“…[9], demonstrates a method of bridging the air-gap between adjacent compromised computers by using their heat emissions and built-in thermal sensors to create a covert communication channel. [10], discusses bridging air-gap system by intentionally creating FM (Frequency Modulation) radio emissions from a Video Display Unit which will be received by nearby mobile phone FM receiver, and this received signal will be further decoded into original data.…”
Section: Previous Research:-mentioning
confidence: 99%
“…With appropriate software, compatible radio signals can be produced by a compromised computer, using the electromagnetic radiation associated with the video display adapter. The combination of a transmitter with a widely used mobile receiver creates a potential covert channel that is not being monitored by ordinary security instrumentation [10]. In this paper we propose a method to deny successful data transmission generated by radio emissions from Video Display Units.…”
Section: Previous Research:-mentioning
confidence: 99%
“…Lots of researchers have discussed radio signal generation from Video cards [1], [2], [5], [10], [11], [12]. Data intentionally modulated on these video signals will be transmitted by computer's monitor cable.…”
Section: Attack Implementation:-mentioning
confidence: 99%
“…Possible attack vectors are (a) through removable media or (b) through outsourced software or hardware components [10]. In the case of Stuxnet, removable media acted as propagation framework [13].…”
Section: Attack Implementation:-mentioning
confidence: 99%
“…In Linux, xvidtune utility is helpful to determine these values. To test data transmission by emanating radio waves from Video Displays, we used variant of code from Tempest for Eliza [10], [11]. To improve quality of transmitted signals we reduced Horizontal and Vertical sync times as per [12].…”
“…[9], demonstrates a method of bridging the air-gap between adjacent compromised computers by using their heat emissions and built-in thermal sensors to create a covert communication channel. [10], discusses bridging air-gap system by intentionally creating FM (Frequency Modulation) radio emissions from a Video Display Unit which will be received by nearby mobile phone FM receiver, and this received signal will be further decoded into original data.…”
Section: Previous Research:-mentioning
confidence: 99%
“…With appropriate software, compatible radio signals can be produced by a compromised computer, using the electromagnetic radiation associated with the video display adapter. The combination of a transmitter with a widely used mobile receiver creates a potential covert channel that is not being monitored by ordinary security instrumentation [10]. In this paper we propose a method to deny successful data transmission generated by radio emissions from Video Display Units.…”
Section: Previous Research:-mentioning
confidence: 99%
“…Lots of researchers have discussed radio signal generation from Video cards [1], [2], [5], [10], [11], [12]. Data intentionally modulated on these video signals will be transmitted by computer's monitor cable.…”
Section: Attack Implementation:-mentioning
confidence: 99%
“…Possible attack vectors are (a) through removable media or (b) through outsourced software or hardware components [10]. In the case of Stuxnet, removable media acted as propagation framework [13].…”
Section: Attack Implementation:-mentioning
confidence: 99%
“…In Linux, xvidtune utility is helpful to determine these values. To test data transmission by emanating radio waves from Video Displays, we used variant of code from Tempest for Eliza [10], [11]. To improve quality of transmitted signals we reduced Horizontal and Vertical sync times as per [12].…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.