2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE) 2014
DOI: 10.1109/malware.2014.6999418
|View full text |Cite
|
Sign up to set email alerts
|

AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies

Abstract: Information is the most critical asset of modern organizations, and accordingly coveted by adversaries. When highly sensitive data is involved, an organization may resort to air-gap isolation, in which there is no networking connection between the inner network and the external world. While infiltrating an air-gapped network has been proven feasible in recent years (e.g., Stuxnet), data exfiltration from an air-gapped network is still considered to be one of the most challenging phases of an advanced cyberatta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
69
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 117 publications
(70 citation statements)
references
References 4 publications
0
69
0
1
Order By: Relevance
“…[9], demonstrates a method of bridging the air-gap between adjacent compromised computers by using their heat emissions and built-in thermal sensors to create a covert communication channel. [10], discusses bridging air-gap system by intentionally creating FM (Frequency Modulation) radio emissions from a Video Display Unit which will be received by nearby mobile phone FM receiver, and this received signal will be further decoded into original data.…”
Section: Previous Research:-mentioning
confidence: 99%
See 4 more Smart Citations
“…[9], demonstrates a method of bridging the air-gap between adjacent compromised computers by using their heat emissions and built-in thermal sensors to create a covert communication channel. [10], discusses bridging air-gap system by intentionally creating FM (Frequency Modulation) radio emissions from a Video Display Unit which will be received by nearby mobile phone FM receiver, and this received signal will be further decoded into original data.…”
Section: Previous Research:-mentioning
confidence: 99%
“…With appropriate software, compatible radio signals can be produced by a compromised computer, using the electromagnetic radiation associated with the video display adapter. The combination of a transmitter with a widely used mobile receiver creates a potential covert channel that is not being monitored by ordinary security instrumentation [10]. In this paper we propose a method to deny successful data transmission generated by radio emissions from Video Display Units.…”
Section: Previous Research:-mentioning
confidence: 99%
See 3 more Smart Citations