Visible to the public A Review of Various Attack Methods on Air-Gapped Systems

TitleA Review of Various Attack Methods on Air-Gapped Systems
Publication TypeConference Paper
Year of Publication2020
AuthorsNaz, M. T., Zeki, A. M.
Conference Name2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)
Date PublishedDec. 2020
PublisherIEEE
ISBN Number978-1-7281-9673-2
KeywordsAcoustics, Air gaps, air-gapped, attack methods, Cameras, composability, covert channels, data leak, Electromagnetic radiation, exfiltrate, Fans, Human Behavior, human factors, Magnetoacoustic effects, Malware, Metrics, pubcrawl, resilience, Resiliency, security breach, Universal Serial Bus
Abstract

In the past air-gapped systems that are isolated from networks have been considered to be very secure. Yet there have been reports of such systems being breached. These breaches have shown to use unconventional means for communication also known as covert channels such as Acoustic, Electromagnetic, Magnetic, Electric, Optical, and Thermal to transfer data. In this paper, a review of various attack methods that can compromise an air-gapped system is presented along with a summary of how efficient and dangerous a particular method could be. The capabilities of each covert channel are listed to better understand the threat it poses and also some countermeasures to safeguard against such attack methods are mentioned. These attack methods have already been proven to work and awareness of such covert channels for data exfiltration is crucial in various industries.

URLhttps://ieeexplore.ieee.org/document/9311995
DOI10.1109/3ICT51146.2020.9311995
Citation Keynaz_review_2020