2019 European Intelligence and Security Informatics Conference (EISIC) 2019
DOI: 10.1109/eisic49498.2019.9108874
|View full text |Cite
|
Sign up to set email alerts
|

HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…The effective range of these techniques is limited to devices within proximity, roughly less than 20 meters, necessitating that the corresponding malware infects both sender and receiver devices to establish the communication link or that the adversary manipulates the receiving party through other means. Research in this domain reveals the feasibility of air-gap covert channels across diverse media such as acoustic [30,31], optical [32,33], seismic [34], magnetic [35,36], thermal [37,38], radio-frequency [39,40], etc., highlighting their versatility and the broad spectrum of potential applications for secure or clandestine information exchange.…”
Section: Related Workmentioning
confidence: 99%
“…The effective range of these techniques is limited to devices within proximity, roughly less than 20 meters, necessitating that the corresponding malware infects both sender and receiver devices to establish the communication link or that the adversary manipulates the receiving party through other means. Research in this domain reveals the feasibility of air-gap covert channels across diverse media such as acoustic [30,31], optical [32,33], seismic [34], magnetic [35,36], thermal [37,38], radio-frequency [39,40], etc., highlighting their versatility and the broad spectrum of potential applications for secure or clandestine information exchange.…”
Section: Related Workmentioning
confidence: 99%
“…Air-gap information can be transmitted using temperature changes in the PC [ 41 , 50 , 51 ]. The CPU of the PC requires an amount of power proportional to the workload requested.…”
Section: Air-gap Attack Techniquesmentioning
confidence: 99%
“…Surprisingly, this transmission could be sensed in a distance of 9 m, but merely with a data rate of less than 1 bit per minute. This has later been used to show a unidirectional channel with a customary smartphone as receiver [11] over half a meter at 0.02 bps. Here, transmission speed and distance has not been the focus, but the fact that the attack is possible in a "walk-by" scenario.…”
Section: Data Transmissionmentioning
confidence: 99%
“…Moreover, an attacker can only use hardware that is available on site-applying additional equipment is not an option. Academic research has explored different ways of attacking air-gapped systems through optical [19,40], acoustic [10,14,18], thermal [11,15], or even electromagnetic [26] and power-dependent [25] communication channels. Most of these approaches only enable a unidirectional communication, that is, either data infiltration or exfiltration.…”
mentioning
confidence: 99%