{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T22:06:46Z","timestamp":1761948406564,"version":"3.37.3"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/tifs.2018.2854708","type":"journal-article","created":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T18:39:36Z","timestamp":1531247976000},"page":"415-430","source":"Crossref","is-referenced-by-count":14,"title":["Xerox Day Vulnerability"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3453-2120","authenticated-orcid":false,"given":"Ben","family":"Nassi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5422-905X","authenticated-orcid":false,"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"HP Laserjet Pro MFP M127","year":"0","key":"ref39"},{"journal-title":"Equation Group","year":"2017","key":"ref38"},{"key":"ref33","article-title":"How to phone home with someone else&#x2019;s phone: Information exfiltration using intentional sound noise on gyroscopic sensors","author":"farshteindiker","year":"2016","journal-title":"Proc WOOT"},{"journal-title":"xLED Covert data exfiltration from air-gapped networks via router LEDs","year":"2017","author":"guri","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61996-8_29"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6163585"},{"journal-title":"HP Officejet Pro 8610","year":"2018","key":"ref36"},{"journal-title":"Global Multi-Function Printer Market 2016&#x2013;2020","year":"2016","key":"ref35"},{"journal-title":"IDC Small Increase in Global Printer and MFP Shipments in Fourth quarter Gains for HP Epson","year":"2017","key":"ref34"},{"key":"ref28","article-title":"Keyboards and covert channels","volume":"15","author":"shah","year":"2006","journal-title":"Proc 15th Conf USENIX Secur Symp"},{"key":"ref27","first-page":"159","article-title":"Whispers in the hyper-space: High-speed covert channel attacks in the cloud","author":"wu","year":"2012","journal-title":"Proc 21st USENIX Security Symp"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978374"},{"journal-title":"German Nuclear Plant Infected With Computer Viruses Operator Says","year":"2018","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.8.11.758-767"},{"journal-title":"Air Gap Computer Network Security","year":"0","author":"locas","key":"ref22"},{"key":"ref21","article-title":"Inaudible sound as a covert channel in mobile devices","author":"deshotels","year":"2014","journal-title":"Proceedings of USENIX Workshop on Offensive Technologies (WOOT)"},{"journal-title":"Use Their Machines Against Them Loading Code With a Copier","year":"0","author":"rich","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_8"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.20"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213271"},{"key":"ref50","article-title":"All your bulbs are belong to us: Investigating the current state of security in connected lighting systems","volume":"abs 1608 3732","author":"morgner","year":"2016","journal-title":"CoRR"},{"journal-title":"Meet Badbios the Mysterious Mac and PC Malware that Jumps Airgaps","year":"2018","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112333"},{"key":"ref40","article-title":"Digital camera imaging evaluation","volume":"8","author":"mazzetta","year":"2005","journal-title":"Electro Optical Industries"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2014.6999418"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.26"},{"key":"ref14","first-page":"849","article-title":"GSMem: Data exfiltration from air-gapped computers over GSM frequencies","author":"guri","year":"2015","journal-title":"24th USENIX Security Symp"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545189"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.13"},{"key":"ref17","article-title":"Hvacker: Bridging the air-gap by manipulating the environment temperature","volume":"2","author":"mirsky","year":"2016","journal-title":"Proc DeepSec Conf"},{"key":"ref18","first-page":"865","article-title":"Thermal covert channels on multi-core platforms","author":"masti","year":"2015","journal-title":"24th USENIX Security Symp"},{"key":"ref19","first-page":"7","article-title":"Bridging the air gap: Inaudible data exfiltration by insiders","author":"o\u2019malley","year":"2014","journal-title":"Proc 20th Americas Conf Inf Syst (AMCIS)"},{"journal-title":"Stuxnet","year":"2018","key":"ref4"},{"journal-title":"Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnet","year":"2018","key":"ref3"},{"journal-title":"Kaspersky finds new nation-state attack-in its own network","year":"2018","key":"ref6"},{"journal-title":"Duqu","year":"2018","key":"ref5"},{"journal-title":"Mahdi","year":"2018","key":"ref8"},{"journal-title":"Flame","year":"2018","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"journal-title":"Agent Btz A Source of Inspiration?","year":"2018","key":"ref9"},{"journal-title":"Reverse Engineering a Bluetooth Lightbulb","year":"0","key":"ref46"},{"journal-title":"Blue Magic","year":"0","key":"ref45"},{"journal-title":"Reverse Engineering a Bluetooth Low Energy Light Bulb","year":"0","author":"dicola","key":"ref48"},{"journal-title":"Reverse Engineering of a Ble Bulb","year":"0","author":"guillier","key":"ref47"},{"journal-title":"Edison","year":"0","key":"ref42"},{"journal-title":"Investigating Low-E Coating Technology for Glass","year":"2017","author":"timberlake","key":"ref41"},{"journal-title":"DJI GO","year":"0","key":"ref44"},{"journal-title":"Inspire1","year":"0","key":"ref43"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8424103\/08409461.pdf?arnumber=8409461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:15:47Z","timestamp":1657746947000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8409461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":50,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2018.2854708","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2019,2]]}}}