{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:33Z","timestamp":1766449713996,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999418","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:44:39Z","timestamp":1421703879000},"page":"58-67","source":"Crossref","is-referenced-by-count":105,"title":["AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies"],"prefix":"10.1109","author":[{"given":"Mordechai","family":"Guri","sequence":"first","affiliation":[]},{"given":"Gabi","family":"Kedma","sequence":"additional","affiliation":[]},{"given":"Assaf","family":"Kachlon","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"523","article-title":"Emission security","author":"anderson","year":"2008","journal-title":"Security Engineering 2nd Edition"},{"journal-title":"Smali-An Assembler\/disassembler for Android's Dex Format","year":"0","key":"17"},{"journal-title":"The Complete Unofficial TEMPEST Information Page","year":"1999","author":"mcnamara","key":"18"},{"key":"15","volume":"19","author":"kania","year":"2009","journal-title":"VGASIG FM Radio Transmitter Using VGA Graphics Card"},{"journal-title":"Android API AudioRecord","year":"0","key":"16"},{"journal-title":"Compromising emanations Eavesdropping risks of computer displays","year":"2003","author":"kuhn","key":"13"},{"journal-title":"Tempest for Eliza","year":"2001","author":"thiele","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"12","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/3-540-49380-8_10","article-title":"Soft Tempest: Hidden data transmission using electromagnetic emanations","author":"kuhn","year":"1998","journal-title":"Information Hiding"},{"journal-title":"AFSSI 7700 Communications and Information Emission Security","article-title":"USAF","year":"2007","key":"21"},{"journal-title":"Phone Finder","year":"2013","key":"3"},{"journal-title":"Tempest for Eliza (Updated Readme File)","year":"2004","author":"thiele","key":"20"},{"journal-title":"Gartner Says Smartphone Sales Grew 46 5 Percent in Second Quarter of 2013 and Exceeded Feature Phone Sales for First Time","year":"0","key":"2"},{"journal-title":"Nokia Corporation Interim Report for Q2 2013 and January-June 2013","year":"2013","key":"1"},{"key":"10","article-title":"Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular","author":"weinmann","year":"2012","journal-title":"USENIX"},{"key":"7","article-title":"An inside look at Stuxnet","author":"larimer","year":"2010","journal-title":"IBM X-Force"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2013.6580475"},{"journal-title":"Equipping Mobile Phones with Broadcast Radio Capability for Emergency Preparedness","year":"0","key":"5"},{"journal-title":"Windows Phone Blog","year":"0","author":"stroh","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.134"},{"journal-title":"Defending A New Domain","year":"2010","key":"8"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","start":{"date-parts":[[2014,10,28]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999418.pdf?arnumber=6999418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T23:54:53Z","timestamp":1498175693000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6999418\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999418","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}