A Review of Various Attack Methods on Air-Gapped Systems
Title | A Review of Various Attack Methods on Air-Gapped Systems |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Naz, M. T., Zeki, A. M. |
Conference Name | 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT) |
Date Published | Dec. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-9673-2 |
Keywords | Acoustics, Air gaps, air-gapped, attack methods, Cameras, composability, covert channels, data leak, Electromagnetic radiation, exfiltrate, Fans, Human Behavior, human factors, Magnetoacoustic effects, Malware, Metrics, pubcrawl, resilience, Resiliency, security breach, Universal Serial Bus |
Abstract | In the past air-gapped systems that are isolated from networks have been considered to be very secure. Yet there have been reports of such systems being breached. These breaches have shown to use unconventional means for communication also known as covert channels such as Acoustic, Electromagnetic, Magnetic, Electric, Optical, and Thermal to transfer data. In this paper, a review of various attack methods that can compromise an air-gapped system is presented along with a summary of how efficient and dangerous a particular method could be. The capabilities of each covert channel are listed to better understand the threat it poses and also some countermeasures to safeguard against such attack methods are mentioned. These attack methods have already been proven to work and awareness of such covert channels for data exfiltration is crucial in various industries. |
URL | https://ieeexplore.ieee.org/document/9311995 |
DOI | 10.1109/3ICT51146.2020.9311995 |
Citation Key | naz_review_2020 |