2019 9th International Conference on Information Science and Technology (ICIST) 2019
DOI: 10.1109/icist.2019.8836735
|View full text |Cite
|
Sign up to set email alerts
|

If Air-Gap Attacks Encounter the Mimic Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…When data are written to or read from a hard disk drive (HDD), inaudible tiny noises are generated. Such noise signals can be utilized to transmit important data from a PC inside a closed network to an external network [ 42 , 43 ]. Air-gap malware operating on the target PC inside the closed network controls the movement of the HDD actuator arm of the air-gapped PC to adjust the ultrasonic frequency generated by this movement.…”
Section: Air-gap Attack Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…When data are written to or read from a hard disk drive (HDD), inaudible tiny noises are generated. Such noise signals can be utilized to transmit important data from a PC inside a closed network to an external network [ 42 , 43 ]. Air-gap malware operating on the target PC inside the closed network controls the movement of the HDD actuator arm of the air-gapped PC to adjust the ultrasonic frequency generated by this movement.…”
Section: Air-gap Attack Techniquesmentioning
confidence: 99%
“…In this way, the malware generates sound waveforms produced by the capacitor and transformer according to the bitstream of the collected data. Similar to attacks using PC fan noise signals and HDD noise signals, this method does not use system resources and can be performed with a user-mode process [ 43 ].…”
Section: Air-gap Attack Techniquesmentioning
confidence: 99%