{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T18:20:54Z","timestamp":1757614854969,"version":"3.44.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T00:00:00Z","timestamp":1753056000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T00:00:00Z","timestamp":1753056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10207-025-01103-2","type":"journal-article","created":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T20:32:57Z","timestamp":1753129977000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing air-gapped systems-review of covert techniques for data ex-filtration and a new clause proposal for ISO 27001"],"prefix":"10.1007","volume":"24","author":[{"given":"Aamna","family":"Saeed","sequence":"first","affiliation":[]},{"given":"Yawar Abbas","family":"Bangash","sequence":"additional","affiliation":[]},{"given":"Maemoona","family":"Farooq","sequence":"additional","affiliation":[]},{"given":"Haris","family":"Rehman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,21]]},"reference":[{"issue":"1","key":"1103_CR1","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/TDSC.2021.3133406","volume":"20","author":"M Guri","year":"2023","unstructured":"Guri, M.: Power-supplay: Leaking sensitive data from air-gapped, audio-gapped systems by turning the power supplies into speakers. IEEE Trans. Dependable Secure Comput. 20(1), 313\u2013330 (2023). https:\/\/doi.org\/10.1109\/TDSC.2021.3133406","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1103_CR2","doi-asserted-by":"publisher","unstructured":"Na, M.\u00a0R., B, S.\u00a0K.:\u201cA study on air-gap networks,\u201d in 2024 5th International Conference on Innovative Trends in Information Technology (ICITIIT), pp.\u00a01\u20136. (2024) https:\/\/doi.org\/10.1109\/ICITIIT61487.2024.10580382","DOI":"10.1109\/ICITIIT61487.2024.10580382"},{"key":"1103_CR3","doi-asserted-by":"crossref","unstructured":"Guri, B., Zadov, M., Elovici, Y.: \u201cLed-it-go: Leaking (a lot of) data from air-gapped computers via the (small) hard drive led,\u201d in Detection of Intrusions and Malware, and Vulnerability Assessment, M. Polychronakis and M. Meier, Eds., Cham: Springer International Publishing, 2017, pp.\u00a0161\u2013184, isbn: 978-3-319-60876-1","DOI":"10.1007\/978-3-319-60876-1_8"},{"key":"1103_CR4","doi-asserted-by":"publisher","unstructured":"Zhao, A.\u00a0P., Zhang, Q., Alhazmi, M., Hu, P.\u00a0J.-H., Zhang, S., Yan, X.: \u201cAi for science: Covert cyberattacks on energy storage systems,\u201d Journal of Energy Storage, vol.\u00a099, p.\u00a0112 835, issn: 2352-152X. (2024) https:\/\/doi.org\/10.1016\/j.est.2024.112835. [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352152X24024216","DOI":"10.1016\/j.est.2024.112835"},{"key":"1103_CR5","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1109\/TIFS.2019.2952257","volume":"15","author":"M Guri","year":"2020","unstructured":"Guri, M., Zadov, B., Bykhovsky, D., Elovici, Y.: Powerhammer: Exfiltrating data from air-gapped computers through power lines. IEEE Trans. Inf. Forensics Secur. 15, 1879\u20131890 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2952257","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1103_CR6","doi-asserted-by":"publisher","unstructured":"K\u00fchnapfel, N., Preu\u00dfer, S., Noppel, M., Schneider, T., Rieck, K., Wressnegger, C.: \u201cLasershark: Establishing fast, bidirectional communication & nbsp;into & nbsp;air-gapped systems,\u201d in Proceedings of the 37th Annual Computer Security Applications Conference, ser.\u00a0ACSAC \u201921, Virtual Event, USA: Association for Computing Machinery, (2021) pp.\u00a0796\u2013811, isbn: 9781450385794. .[Online]. Available: https:\/\/doi.org\/10.1145\/3485832.3485911","DOI":"10.1145\/3485832.3485911"},{"key":"1103_CR7","doi-asserted-by":"publisher","unstructured":"Guri, M., Zadov, B., Bykhovsky, D., Elovici, Y.: \u201cCtrl-alt-led: Leaking data from air-gapped computers via keyboard leds,\u201d in 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), vol.\u00a01, 2019, pp.\u00a0801\u2013810. https:\/\/doi.org\/10.1109\/COMPSAC.2019.00118","DOI":"10.1109\/COMPSAC.2019.00118"},{"key":"1103_CR8","doi-asserted-by":"publisher","unstructured":"Lee, J., Yoo, J., Lee, J., Choi, Y., Yoo, S.\u00a0K., Song, J.: \u201cOptical air-gap attacks: Analysis and iot threat implications,\u201d IEEE Network, pp.\u00a01\u20131, (2024) https:\/\/doi.org\/10.1109\/MNET.2024.3382969","DOI":"10.1109\/MNET.2024.3382969"},{"key":"1103_CR9","unstructured":"\u201cIso\/iec 27001:2022 information security management systems \u2014 requirements.,\u201d 2022. [Online]. Available: https:\/\/www.iso.org\/standard\/78428.html"},{"issue":"3","key":"1103_CR10","doi-asserted-by":"publisher","first-page":"2547","DOI":"10.1109\/TDSC.2022.3186627","volume":"20","author":"M Guri","year":"2023","unstructured":"Guri, M.: Air-fi: Leaking data from air-gapped computers using wi-fi frequencies. IEEE Trans. Dependable Secure Comput. 20(3), 2547\u20132564 (2023). https:\/\/doi.org\/10.1109\/TDSC.2022.3186627","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1103_CR11","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/CSR54599.2022.9850284","volume":"2022","author":"M Guri","year":"2022","unstructured":"Guri, M.: \u201cEtherled: Sending covert morse signals from air-gapped devices via network card (nic) leds,\u2019\u2019 in. IEEE International Conference on Cyber Security and Resilience (CSR) 2022, 163\u2013170 (2022). https:\/\/doi.org\/10.1109\/CSR54599.2022.9850284","journal-title":"IEEE International Conference on Cyber Security and Resilience (CSR)"},{"key":"1103_CR12","doi-asserted-by":"publisher","unstructured":"Guri, M.: \u201cAir-gap electromagnetic covert channel,\u201d IEEE Transactions on Dependable and Secure Computing, pp.\u00a01\u201318, (2023) https:\/\/doi.org\/10.1109\/TDSC.2023.3300035","DOI":"10.1109\/TDSC.2023.3300035"},{"key":"1103_CR13","doi-asserted-by":"publisher","unstructured":"Guri, M.: \u201cSatan: Air-gap exfiltration attack via radio signals from sata cables,\u201d in 2022 19th Annual International Conference on Privacy, Security & Trust (PST), pp.\u00a01\u201310. (2022) https:\/\/doi.org\/10.1109\/PST55820.2022.9851978","DOI":"10.1109\/PST55820.2022.9851978"},{"key":"1103_CR14","doi-asserted-by":"publisher","unstructured":"Guri, M.: \u201cMagneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields,\u201d Future Generation Computer Systems, vol.\u00a0115, pp.\u00a0115\u2013125, issn: 0167-739X. (2021) https:\/\/doi.org\/10.1016\/j.future.2020.08.045. [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X2030916X","DOI":"10.1016\/j.future.2020.08.045"},{"key":"1103_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/DESEC.2018.8625124","volume":"2018","author":"M Guri","year":"2018","unstructured":"Guri, M., Solewicz, Y., Elovici, Y.: \u201cMosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication,\u2019\u2019 in. IEEE Conference on Dependable and Secure Computing (DSC) 2018, 1\u20138 (2018). https:\/\/doi.org\/10.1109\/DESEC.2018.8625124","journal-title":"IEEE Conference on Dependable and Secure Computing (DSC)"},{"key":"1103_CR16","doi-asserted-by":"publisher","unstructured":"Guri, M.: \u201cBeatcoin: Leaking private keys from air-gapped cryptocurrency wallets,\u201d in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp.\u00a01308\u20131316. (2018) https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00227","DOI":"10.1109\/Cybermatics_2018.2018.00227"},{"key":"1103_CR17","doi-asserted-by":"publisher","unstructured":"Guri, M., Bykhovsky, D., Elovici, Y.: \u201cBrightness: Leaking sensitive data from air-gapped workstations via screen brightness,\u201d in 2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 2019, pp.\u00a01\u20136. https:\/\/doi.org\/10.1109\/CMI48017.2019.8962137","DOI":"10.1109\/CMI48017.2019.8962137"},{"issue":"1","key":"1103_CR18","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TDSC.2015.2509994","volume":"15","author":"A Nourian","year":"2018","unstructured":"Nourian, A., Madnick, S.: A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet. IEEE Trans. Dependable Secure Comput. 15(1), 2\u201313 (2018). https:\/\/doi.org\/10.1109\/TDSC.2015.2509994","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1103_CR19","doi-asserted-by":"publisher","unstructured":"Guri, M.: \u201cExfiltrating data from air-gapped computers via vibrations,\u201d Future Generation Computer Systems, vol.\u00a0122, pp.\u00a069\u201381, issn: 0167-739X. (2021) https:\/\/doi.org\/10.1016\/j.future.2021.03.025. [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X21001151","DOI":"10.1016\/j.future.2021.03.025"},{"key":"1103_CR20","doi-asserted-by":"publisher","unstructured":"Guri, M.: \u201cNear field air-gap covert channel attack,\u201d in 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.\u00a0490\u2013497. (2022) https:\/\/doi.org\/10.1109\/TrustCom56396.2022.00074","DOI":"10.1109\/TrustCom56396.2022.00074"},{"key":"1103_CR21","doi-asserted-by":"publisher","unstructured":"Guri, M.: \u201cEl-grillo: Leaking data ultrasonically from air-gapped pcs via the tiny motherboard buzzer,\u201d in 2023 20th Annual International Conference on Privacy, Security and Trust (PST), pp.\u00a01\u201311. (2023) https:\/\/doi.org\/10.1109\/PST58708.2023.10319985","DOI":"10.1109\/PST58708.2023.10319985"},{"key":"1103_CR22","doi-asserted-by":"publisher","unstructured":"Guri, M.: \u201cAirkeylogger: Hardwareless air-gap keylogging attack,\u201d in 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC), pp.\u00a0637\u2013647. (2023) https:\/\/doi.org\/10.1109\/COMPSAC57700.2023.00089","DOI":"10.1109\/COMPSAC57700.2023.00089"},{"key":"1103_CR23","doi-asserted-by":"publisher","unstructured":"Guri, M.: \u201cGairoscope: Leaking data from air-gapped computers to nearby smartphones using speakers-to-gyro communication,\u201d in 2021 18th International Conference on Privacy, Security and Trust (PST), pp.\u00a01\u201310. (2021) https:\/\/doi.org\/10.1109\/PST52912.2021.9647842","DOI":"10.1109\/PST52912.2021.9647842"},{"key":"1103_CR24","doi-asserted-by":"publisher","unstructured":"Guri, M.: \u201cLantenna: Exfiltrating data from air-gapped networks via ethernet cables emission,\u201d in 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), pp.\u00a0745\u2013754. (2021) https:\/\/doi.org\/10.1109\/COMPSAC51774.2021.00106","DOI":"10.1109\/COMPSAC51774.2021.00106"},{"key":"1103_CR25","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1109\/TIFS.2019.2938404","volume":"15","author":"M Guri","year":"2020","unstructured":"Guri, M., Zadov, B., Elovici, Y.: Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields. IEEE Trans. Inf. Forensics Secur. 15, 1190\u20131203 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2938404","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1103_CR26","doi-asserted-by":"publisher","unstructured":"Guri, M., Monitz, M., Elovici, Y.: \u201cUsbee: Air-gap covert-channel via electromagnetic emission from usb,\u201d in 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp.\u00a0264\u2013268. (2016) https:\/\/doi.org\/10.1109\/PST.2016.7906972","DOI":"10.1109\/PST.2016.7906972"},{"key":"1103_CR27","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/EISIC49498.2019.9108874","volume":"2019","author":"M Guri","year":"2019","unstructured":"Guri, M.: \u201cHotspot: Crossing the air-gap between isolated pcs and nearby smartphones using temperature,\u2019\u2019 in. European Intelligence and Security Informatics Conference (EISIC) 2019, 94\u2013100 (2019). https:\/\/doi.org\/10.1109\/EISIC49498.2019.9108874","journal-title":"European Intelligence and Security Informatics Conference (EISIC)"},{"key":"1103_CR28","doi-asserted-by":"publisher","unstructured":"Guri, M., Zadov, B., Daidakulov, A., Elovici, Y.: \u201cXled: Covert data exfiltration from air-gapped networks via switch and router leds,\u201d in 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp.\u00a01\u201312. (2018) https:\/\/doi.org\/10.1109\/PST.2018.8514196","DOI":"10.1109\/PST.2018.8514196"},{"key":"1103_CR29","doi-asserted-by":"publisher","unstructured":"Guri, M.: \u201cCd-leak: Leaking secrets from audioless air-gapped computers using covert acoustic signals from cd\/dvd drives,\u201d in 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), pp.\u00a0808\u2013816. (2020) https:\/\/doi.org\/10.1109\/COMPSAC48688.2020.0-163","DOI":"10.1109\/COMPSAC48688.2020.0-163"},{"key":"1103_CR30","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1109\/IBCAST51254.2021.9393281","volume":"2021","author":"A Masood","year":"2021","unstructured":"Masood, A., Masood, A.: \u201cA taxonomy of insider threat in isolated (air-gapped) computer networks,\u2019\u2019 in. International Bhurban Conference on Applied Sciences and Technologies (IBCAST) 2021, 678\u2013685 (2021). https:\/\/doi.org\/10.1109\/IBCAST51254.2021.9393281","journal-title":"International Bhurban Conference on Applied Sciences and Technologies (IBCAST)"},{"key":"1103_CR31","doi-asserted-by":"publisher","unstructured":"Faizul Bari, M., Sen, S.: \u201cNoisehopper: Emission hopping air-gap covert side channel with lower probability of detection,\u201d in 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.\u00a021\u201332. (2024) https:\/\/doi.org\/10.1109\/HOST55342.2024.10545402","DOI":"10.1109\/HOST55342.2024.10545402"},{"key":"1103_CR32","doi-asserted-by":"publisher","unstructured":"Aouedi, O., Vu, T.-H., Sacco, A., et al.: \u201cA survey on intelligent internet of things: Applications, security, privacy, and future directions,\u201d IEEE Communications Surveys & Tutorials, pp.\u00a01\u20131, 2024. https:\/\/doi.org\/10.1109\/COMST.2024.3430368","DOI":"10.1109\/COMST.2024.3430368"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01103-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01103-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01103-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T11:33:22Z","timestamp":1757072002000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01103-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,21]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1103"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01103-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,7,21]]},"assertion":[{"value":"21 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No, I declare that the authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"182"}}