{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:36:30Z","timestamp":1771698990675,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819616237","type":"print"},{"value":"9789819616244","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1624-4_18","type":"book-chapter","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T06:53:44Z","timestamp":1738652024000},"page":"231-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Air-Fuzz: Feasibility Analysis of\u00a0Fuzzing-Based Side-Channel Information Leakage Attack in\u00a0Air-Gapped Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-5538-7187","authenticated-orcid":false,"given":"Yeon-Jin","family":"Kim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0939-5762","authenticated-orcid":false,"given":"Na-Eun","family":"Park","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5777-4029","authenticated-orcid":false,"given":"Il-Gu","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,5]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"39824","DOI":"10.1109\/ACCESS.2023.3269297","volume":"11","author":"VK Quy","year":"2023","unstructured":"Quy, V.K., Chehri, A., Quy, N.M., Han, N.D., Ban, N.T.: Innovative trends in the 6G era: a comprehensive survey of architecture, applications, technologies, and challenges. IEEE Access 11, 39824\u201339844 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3269297","journal-title":"IEEE Access"},{"key":"18_CR2","doi-asserted-by":"publisher","unstructured":"Kaur, J., Ramkumar, K.R.: The recent trends in cyber security: a review. J. King Saud Univ. Comput. Inf. Sci. 34(8), 5766\u20135781 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2021.01.018","DOI":"10.1016\/j.jksuci.2021.01.018"},{"key":"18_CR3","doi-asserted-by":"publisher","unstructured":"Lee, S., Shim, H., Lee, Y., Park, T., Park, S., Lee, I.: Study on systematic ransomware detection techniques. In: 2022 24th International Conference on Advanced Communication Technology (ICACT), pp. 297\u2013301 (2022). https:\/\/doi.org\/10.23919\/ICACT53585.2022.9728909","DOI":"10.23919\/ICACT53585.2022.9728909"},{"issue":"2","key":"18_CR4","doi-asserted-by":"publisher","first-page":"4231","DOI":"10.32604\/cmc.2023.034287","volume":"75","author":"S Jeon","year":"2023","unstructured":"Jeon, S., Lee, S., Lee, E., Lee, Y., Ryu, J., et al.: An effective threat detection frame-work for advanced persistent cyberattacks. Comput. Mater. Continua 75(2), 4231\u20134253 (2023). https:\/\/doi.org\/10.32604\/cmc.2023.034287","journal-title":"Comput. Mater. Continua"},{"key":"18_CR5","doi-asserted-by":"publisher","unstructured":"Miketic, I., Dhananjay, K., Salman, E.: Covert channel communication as an emerging security threat in 2.5D\/3D integrated systems. Sensors 23(2081), 2081 (2023). https:\/\/doi.org\/10.3390\/s23042081","DOI":"10.3390\/s23042081"},{"issue":"3215","key":"18_CR6","doi-asserted-by":"publisher","first-page":"3215","DOI":"10.3390\/s23063215","volume":"23","author":"J Park","year":"2023","unstructured":"Park, J., Yoo, J., Yu, J., Lee, J., Song, J.: A survey on air-gap attacks: fundamentals, transport means, attack scenarios and challenges. Sensors 23(3215), 3215 (2023). https:\/\/doi.org\/10.3390\/s23063215","journal-title":"Sensors"},{"key":"18_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100464","volume":"35","author":"T Miller","year":"2021","unstructured":"Miller, T., Staves, A., Maesschalck, S., Sturdee, M., Green, B.: Looking back to look for-ward: lessons learnt from cyber-attacks on industrial control systems. Int. J. Crit. Infrastruct. Protect. 35, 100464 (2021). https:\/\/doi.org\/10.1016\/j.ijcip.2021.100464","journal-title":"Int. J. Crit. Infrastruct. Protect."},{"issue":"3","key":"18_CR8","doi-asserted-by":"publisher","first-page":"25472564","DOI":"10.1109\/TDSC.2022.3186627","volume":"20","author":"M Guri","year":"2023","unstructured":"Guri, M.: AIR-FI: leaking data from air-gapped computers using Wi-Fi frequencies. IEEE Trans. Dependable Secure Comput. 20(3), 25472564 (2023). https:\/\/doi.org\/10.1109\/TDSC.2022.3186627","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Lee, J., Yoo, J., Lee, J., Choi, Y., Yoo, S.K., Song, J.: Optical air-gap attacks: analysis and IoT threat implications. IEEE Netw. (2024). https:\/\/doi.org\/10.1109\/MNET.2024.3382969","DOI":"10.1109\/MNET.2024.3382969"},{"key":"18_CR10","doi-asserted-by":"publisher","unstructured":"Li, Z., Chen, B., Chen, X., et al.: SpiralSpy: exploring a stealthy and practical covert channel to attack air-gapped computing devices via mmWave sensing. In: Network and Distributed Systems Security (NDSS) Symposium (2022). https:\/\/doi.org\/10.14722\/ndss.2022.23023","DOI":"10.14722\/ndss.2022.23023"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Chen, D., Chowdhury, M.M., Latif, S.: Data breaches in corporate setting. In: 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), pp. 01\u201306 (2021). https:\/\/doi.org\/10.1109\/ICECCME52200.2021.9590974","DOI":"10.1109\/ICECCME52200.2021.9590974"},{"key":"18_CR12","unstructured":"F5OEO: RPiTX: Turning a Raspberry Pi into a RF Transmitter, GitHub repository. https:\/\/github.com\/F5OEO\/rpitx"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1624-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T06:53:46Z","timestamp":1738652026000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1624-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819616237","9789819616244"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1624-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"5 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wisa.or.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}