{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T14:08:38Z","timestamp":1758636518087,"version":"3.28.0"},"reference-count":70,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647842","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T16:08:01Z","timestamp":1640102881000},"page":"1-10","source":"Crossref","is-referenced-by-count":7,"title":["GAIROSCOPE: Leaking Data from Air-Gapped Computers to Nearby Smartphones using Speakers-to-Gyro Communication"],"prefix":"10.1109","author":[{"given":"Mordechai","family":"Guri","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2018.8625124"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_6"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2014.6999418"},{"key":"ref32","first-page":"849","article-title":"Gsmem: Data exfiltration from air-gapped computers over gsm frequencies","author":"guri","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906933"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3177230"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.26"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2870641"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906972"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906972"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818005"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2893253"},{"key":"ref61","first-page":"4","article-title":"The ghost in the browser: Analysis of web-based malware","volume":"7","author":"provos","year":"2007","journal-title":"HOTBOTS"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420987"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CMI48017.2019.8962137"},{"key":"ref64","first-page":"881","article-title":"Rocking drones with intentional sound noise on gyroscopic sensors","author":"son","year":"2015","journal-title":"24th USENIX Security Symposium USENIX Security 15"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.004"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(11)70041-0"},{"key":"ref66","first-page":"1545","article-title":"Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors","author":"tu","year":"2018","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref29","article-title":"Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields","author":"guri","year":"2018","journal-title":"arXiv preprint arXiv 1802 0231"},{"key":"ref67","first-page":"1","article-title":"Compromising electromagnetic emanations of wired and wireless keyboards","author":"vuagnoux","year":"2009","journal-title":"USENIX Security Symposium"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699114"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030184"},{"journal-title":"Agent btz - wikipedia","year":"2021","key":"ref2"},{"journal-title":"4 vulnerabilities under attack give hackers full control of android devices - ars technica","year":"2021","key":"ref1"},{"key":"ref20","article-title":"An indian nuclear power plant suffered a cyberattack","author":"das","year":"2019","journal-title":"heres what you need to know - the washington post"},{"key":"ref22","article-title":"Inaudible sound as a covert channel in mobile devices","author":"deshotels","year":"2014","journal-title":"WOOT"},{"journal-title":"Jumping the airgap","year":"2017","author":"dean","key":"ref21"},{"key":"ref24","first-page":"620103","article-title":"Data exfiltration and covert channels","author":"giani","year":"2006","journal-title":"Defense and Security Symposium"},{"key":"ref23","article-title":"Inaudible sound as a covert channel in mobile devices","author":"deshotels","year":"2014","journal-title":"WOOT"},{"key":"ref26","article-title":"Power-supplay: Leaking data from air-gapped systems by turning the power-supplies into speakers","author":"guri","year":"2020","journal-title":"arXiv preprint arXiv 2005 06138"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-163"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927084"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_10"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1201\/1086.1065898X\/46353.15.4.20060901\/95427.3"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/11558859_19","article-title":"Embedding covert channels into tcp\/ip","author":"murdoch","year":"2005","journal-title":"Information Hiding"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0018"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335712"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.50"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545189"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6471059"},{"journal-title":"Compromising emanations Eavesdropping risks of computer displays","year":"2002","author":"kuhn","key":"ref52"},{"journal-title":"funtenna github","year":"2016","key":"ref10"},{"journal-title":"Github - ubeacsec\/silverdog An audio firewall for chrome!","year":"2017","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101721"},{"journal-title":"Audio jammer &#x2014; counter surveillance systems","year":"2018","key":"ref12"},{"journal-title":"Praat Doing phonetics by computer","year":"2018","key":"ref13"},{"journal-title":"Products - pulsar instruments plc","year":"2018","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1186\/s11671-021-03481-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2492007.2492018"},{"key":"ref17","first-page":"3","article-title":"On acoustic covert channels between air-gapped systems","author":"carrara","year":"2014","journal-title":"Intemationsal Symposium on Foundations and Practice of Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930800"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"journal-title":"Hackers target the air-gapped networks of the taiwanese and philippine military &#x2014; zdnet","year":"2021","key":"ref4"},{"journal-title":"Eset research discovers cyber espionage framework ramsay &#x2014; eset","year":"2021","key":"ref3"},{"journal-title":"No big deal&#x2026; kremlin hackers &#x2018;jumped air-gapped networks&#x2019; to pwn us power utilities - the register","year":"2021","key":"ref6"},{"journal-title":"Microsoft launches &#x2018;top secret&#x2019; azure cloud region for us intelligence community","year":"2021","key":"ref5"},{"journal-title":"Storefront - top secret\/sensitive compartmented information data","year":"2021","key":"ref8"},{"journal-title":"Sensor onreading - web apis &#x2014; mdn","year":"2021","key":"ref7"},{"year":"2000","key":"ref49"},{"journal-title":"9 counter surveillance tools you can legally use &#x2014; independent living news","year":"2013","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2938404"},{"key":"ref45","first-page":"161","author":"guri","year":"2017","journal-title":"Led-it-go Leaking (a lot of) data from air-gapped computers via the (small) hard drive LED"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484373"},{"key":"ref47","article-title":"On covert acoustical mesh networks in air","author":"hanspach","year":"2014","journal-title":"arXiv preprint arXiv 1406 1213"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00118"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102458"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514196"},{"key":"ref43","article-title":"Powerhammer: Exfiltrating data from air-gapped computers through power lines","author":"guri","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647842.pdf?arnumber=9647842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:59:51Z","timestamp":1652187591000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647842","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}