Bridgeware: the air-gap malware

@article{Guri2018BridgewareTA,
  title={Bridgeware: the air-gap malware},
  author={M. Guri and Y. Elovici},
  journal={Commun. ACM},
  year={2018},
  volume={61},
  pages={74-82}
}
  • M. Guri, Y. Elovici
  • Published 2018
  • Computer Science
  • Commun. ACM
  • The challenge of combatting malware designed to breach air-gap isolation in order to leak data. 
    27 Citations

    Figures, Tables, and Topics from this paper

    Explore Further: Topics Discussed in This Paper

    xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs
    • 16
    BeatCoin : Leaking Private Keys from Air-Gapped
    • PDF
    BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets
    • M. Guri
    • Computer Science
    • 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
    • 2018
    • 9
    • PDF
    LCD TEMPEST Air-Gap Attack Reloaded
    • M. Guri, Matan Monitz
    • Computer Science
    • 2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)
    • 2018
    • 4
    Your Noise, My Signal
    • 2
    ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields
    • 28
    • PDF
    PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines
    • 32
    • PDF
    Optical Covert Channel from Air-Gapped Networks via Remote Orchestration of Router/Switch LEDs
    • M. Guri
    • Computer Science
    • 2018 European Intelligence and Security Informatics Conference (EISIC)
    • 2018
    • 1

    References

    SHOWING 1-10 OF 44 REFERENCES
    Exfiltration of information from air-gapped machines using monitor's LED indicator
    • 23
    Information leakage from optical emanations
    • 155
    • PDF
    AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies
    • 100
    • PDF
    Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
    • 284
    • PDF
    GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies
    • 100
    • PDF