Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy 2017
DOI: 10.1145/3140241.3140252
|View full text |Cite
|
Sign up to set email alerts
|

Jumping the Air Gap

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Recently, IoT devices such as smart light bulbs and air purifiers have been introduced into offices [ 45 , 46 , 47 , 48 ]. This means that in a closed network office there may now be additional devices that can be used for air-gap attacks, in addition to the PCs and peripheral devices discussed earlier.…”
Section: Air-gap Attack Techniquesmentioning
confidence: 99%
“…Recently, IoT devices such as smart light bulbs and air purifiers have been introduced into offices [ 45 , 46 , 47 , 48 ]. This means that in a closed network office there may now be additional devices that can be used for air-gap attacks, in addition to the PCs and peripheral devices discussed earlier.…”
Section: Air-gap Attack Techniquesmentioning
confidence: 99%
“…Agadakos et al [13] have recently highlighted that one of the key issues with the IoT is that security is solely considered on device and device-to-device levels. They claim that, given the complexity of interactions that happen in the IoT, the approach should be much more holistic.…”
Section: Jumping the Air Gapmentioning
confidence: 99%
“…As a last use case, in [13] the authors show that with their approach it is possible to model transitions and states, allowing them to identify security violations over time. In their example, there is a Roomba Vacuum that should never leave the house, and an OORT Smart Lock capable of closing/opening a garage door to the outside.…”
Section: Jumping the Air Gapmentioning
confidence: 99%
“…The imposed high competition between IoT vendors leads to overlooking cybersecurity aspects in order to accelerate the production of devices and reduce their prices. Furthermore, many of the IoT and CPS devices do not have sufficient energy, storage, or computational power to implement up-to-date anti-malware programs and/or sophisticated intrusion defense mechanisms [8]- [11]. In large-scale IoT/CPS networks, there is no distinct boundary between secured and public (i.e., unsecured) domains to enforce security policies on the incoming/outgoing traffic.…”
mentioning
confidence: 99%
“…The lack of per-device defense mechanisms and network-wide security administration open several loopholes for network intrusion and malware infiltration. Even worse, exploiting the high spatial density of devices and direct wireless connectivity (e.g., machine-to-machine and device-to-device communications), the malware infection can stealthily propagate from one device to another and form an epidemic outbreak without being noticed to security administration [8], [12]- [14]. Malware diffusion through the devices can be further accelerated via emerging beyond 5G technologies, such as nonorthogonal multiple access (NOMA) and ultrareliable low-latency communications (URLLCs), which are meant to enhance information dissemination.…”
mentioning
confidence: 99%