2016
DOI: 10.48550/arxiv.1606.05915
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

5
2

Authors

Journals

citations
Cited by 17 publications
(23 citation statements)
references
References 0 publications
0
23
0
Order By: Relevance
“…In this method, a malware controls the electromagnetic emission from a computer and modulates data on top of it. It also have been shown that attackers can exfiltrate data from air-gapped computers using ultrasound, magnetic signals, and even heat emission [3]- [6].…”
Section: A Air-gap Exfiltrationmentioning
confidence: 99%
See 1 more Smart Citation
“…In this method, a malware controls the electromagnetic emission from a computer and modulates data on top of it. It also have been shown that attackers can exfiltrate data from air-gapped computers using ultrasound, magnetic signals, and even heat emission [3]- [6].…”
Section: A Air-gap Exfiltrationmentioning
confidence: 99%
“…Hanspach introduced a method called acoustical mesh networks in air, which enables the transmission of data via high frequency sound waves [13]. Guri et al also presented Fansmitter [3] and DiskFiltration [14], two methods enabling the exfiltration of data via sound waves, even when the computers are not equipped with speakers or audio hardware. This research showed how to utilize computer fans and hard disk drive actuator arms to generate covert sound signals.…”
Section: A Electromagnetic Magnetic Acoustic and Thermalmentioning
confidence: 99%
“…All of the acoustic methods presented above require speakers. In 2016, Guri et al introduced Fansmitter, a malware which facilitates the exfiltration of data from an air-gapped computer via noise intentionally emitted from the PC fans [27]. In this method, the transmitting computer does not need to be equipped with audio hardware or an internal or external speaker.…”
Section: E Acousticmentioning
confidence: 99%
“…Magnetic MAGNETO [20] (CPU-generated magnetic fields) ODINI [31] (Faraday shields bypass) Hard-disk-drive [39] Acoustic Fansmitter [27] (computer fan noise) DiskFiltration [28] (hard disk noise) Ultrasonic [33], [13] MOSQUITO (speaker-to-speaker)…”
Section: E Acousticmentioning
confidence: 99%
“…The network covert channels through which sensitive data are hidden in network packages with steganography were surveyed by Zander [43] in 2007. A physically separated covert channel, also called an air-gapped covert channel, leaks data directly via a physical emitting source such as an LED [29,38,15,14,44,45], an acoustic source [18,35,26,12,13] or an antenna [24,10,9,11,31] etc. No any normal channel can be utilized for such air-gapped covert channels.…”
Section: Introductionmentioning
confidence: 99%