ACKNOWLEDGEMENTS
We thank FAPESP (S
˜
ao Paulo Research Foundation)
for financial support through process 2015/13876-7.
REFERENCES
Abraham, S. and Chengalur-Smith, I. (2010). An overview
of social engineering malware: Trends, tactics, and
implications. Technology in Society, 32(3):183–196.
Camera, D. (2013). LUFA - Lightweight USB Framework
for AVRs. http://www.fourwalledcubicle.com.
Caudill, A. (2014). Phison 2251-03 (2303) Custom
Firmware and Existing Firmware Patches (BadUSB).
https://github.com/adamcaudill/Psychson.
Cheddad, A., Condell, J., Curran, K., and McKevitt, P.
(2010). Digital image steganography: Survey and
analysis of current methods. Signal Processing,
90(3):727–752.
Clark, J., Leblanc, S., and Knight, S. (2009). Hardware tro-
jan horse device based on unintended USB channels.
In NSS, pages 1–8. IEEE.
Guri, M., Hasson, O., Kedma, G., and Elovici, Y. (2016a).
VisiSploit: An Optical Covert-Channel to Leak Data
through an Air-Gap. CoRR, abs/1607.03946.
Guri, M., Kachlon, A., Hasson, O., Kedma, G., Mirsky,
Y., and Elovici, Y. (2015a). Gsmem: Data exfiltra-
tion from air-gapped computers over GSM frequen-
cies. In USENIX Security Symposium, pages 849–864.
USENIX Association.
Guri, M., Kedma, G., Kachlon, A., and Elovici, Y. (2014).
Airhopper: Bridging the air-gap between isolated net-
works and mobile phones using radio frequencies. In
MALWARE, pages 58–67. IEEE.
Guri, M., Monitz, M., and Elovici, Y. (2016b). USBee:
Air-Gap Covert-Channel via Electromagnetic Emis-
sion from USB. CoRR, abs/1608.08397.
Guri, M., Monitz, M., Mirski, Y., and Elovici, Y. (2015b).
BitWhisper: Covert Signaling Channel between Air-
Gapped Computers Using Thermal Manipulations. In
CSF, pages 276–289. IEEE.
Guri, M., Solewicz, Y. A., Daidakulov, A., and Elovici,
Y. (2016c). DiskFiltration: Data Exfiltration from
Speakerless Air-Gapped Computers via Covert Hard
Drive Noise. CoRR, abs/1608.03431.
Guri, M., Solewicz, Y. A., Daidakulov, A., and Elovici,
Y. (2016d). Fansmitter: Acoustic Data Exfiltration
from (Speakerless) Air-Gapped Computers. CoRR,
abs/1606.05915.
Hamming, R. W. (1986). Coding and information theory
(2. ed.). Prentice Hall.
Hanspach, M. and Goetz, M. (2014). Recent developments
in covert acoustical communications. In Sicherheit,
volume 228 of LNI, pages 243–254. GI.
Itseez (2015). Open source computer vision library, version
3.0. https://github.com/itseez/opencv.
Kuhn, M. G. and Anderson, R. J. (1998). Soft tempest: Hid-
den data transmission using electromagnetic emana-
tions. In Information Hiding, volume 1525 of Lecture
Notes in Computer Science, pages 124–142. Springer.
Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare
weapon. IEEE Security & Privacy, 9(3):49–51.
Loughry, J. and Umphress, D. A. (2002). Information leak-
age from optical emanations. ACM Trans. Inf. Syst.
Secur., 5(3):262–289.
Maass, P. (2013). How Laura Poitras Helped Snow-
den Spill His Secrets. New York Times.
http://www.nytimes.com/2013/08/18/magazine/laura-
poitras-snowden.html.
Sepetnitsky, V., Guri, M., and Elovici, Y. (2014). Exfiltra-
tion of information from air-gapped machines using
monitor’s LED indicator. In JISIC, pages 264–267.
IEEE.
Tischer, M., Durumeric, Z., Foster, S., Duan, S., Mori, A.,
Bursztein, E., and Bailey, M. (2016). Users really do
plug in USB drives they find. In IEEE Symposium on
Security and Privacy, pages 306–319. IEEE Computer
Society.
Tsagourias, N. (2012). Cyber attacks, self-defence and the
problem of attribution. Journal of Conflict and Secu-
rity Law.
Verble, J. (2014). The NSA and Edward Snowden: surveil-
lance in the 21st century. SIGCAS Computers and So-
ciety, 44(3):14–20.
Zaddach, J., Kurmus, A., Balzarotti, D., Blass, E., Fran-
cillon, A., Goodspeed, T., Gupta, M., and Koltsi-
das, I. (2013). Implementation and implications of
a stealth hard-drive backdoor. In ACSAC, pages 279–
288. ACM.
Zander, S., Armitage, G. J., and Branch, P. (2007). A sur-
vey of covert channels and countermeasures in com-
puter network protocols. IEEE Communications Sur-
veys and Tutorials, 9(1-4):44–57.
ICISSP 2017 - 3rd International Conference on Information Systems Security and Privacy
480