Bridgeware: the air-gap malware
@article{Guri2018BridgewareTA, title={Bridgeware: the air-gap malware}, author={M. Guri and Y. Elovici}, journal={Commun. ACM}, year={2018}, volume={61}, pages={74-82} }
The challenge of combatting malware designed to breach air-gap isolation in order to leak data.
Figures, Tables, and Topics from this paper
27 Citations
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs
- Computer Science
- 2018 16th Annual Conference on Privacy, Security and Trust (PST)
- 2018
- 16
BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets
- Computer Science
- 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
- 2018
- 9
- PDF
LCD TEMPEST Air-Gap Attack Reloaded
- Computer Science
- 2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)
- 2018
- 4
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields
- Computer Science
- IEEE Transactions on Information Forensics and Security
- 2020
- 28
- PDF
PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines
- Computer Science
- IEEE Transactions on Information Forensics and Security
- 2020
- 32
- PDF
Security Professionals Must Reinforce Detect Attacks to Avoid Unauthorized Data Exposure
- Business
- 2020
- PDF
Optical Covert Channel from Air-Gapped Networks via Remote Orchestration of Router/Switch LEDs
- Computer Science
- 2018 European Intelligence and Security Informatics Conference (EISIC)
- 2018
- 1
References
SHOWING 1-10 OF 44 REFERENCES
Exfiltration of information from air-gapped machines using monitor's LED indicator
- Computer Science
- 2014 IEEE Joint Intelligence and Security Informatics Conference
- 2014
- 23
Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack
- Computer Science
- TIST
- 2017
- 33
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies
- Computer Science
- 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)
- 2014
- 100
- PDF
Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies
- Computer Science
- IEEE Internet of Things Journal
- 2017
- 86
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
- Computer Science
- Information Hiding
- 1998
- 284
- PDF
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED
- Computer Science
- DIMVA
- 2017
- 61
- PDF
Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack
- Computer Science
- WISA
- 2015
- 17
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies
- Computer Science
- USENIX Security Symposium
- 2015
- 100
- PDF