{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:16:22Z","timestamp":1771467382929,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"15","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"European Regional Development Fund, COMPETE 2020","award":["Smart5Grid (POCI-01-0247-FEDER-047226"],"award-info":[{"award-number":["Smart5Grid (POCI-01-0247-FEDER-047226"]}]},{"name":"Funda??o para a Ci?ncia e Tecnologia and PIDDAC","award":["CISUC R&D Unit - UIDB\/00326\/2020"],"award-info":[{"award-number":["CISUC R&D Unit - UIDB\/00326\/2020"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,8,1]]},"DOI":"10.1109\/jiot.2023.3262873","type":"journal-article","created":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T19:23:09Z","timestamp":1680117789000},"page":"13727-13741","source":"Crossref","is-referenced-by-count":6,"title":["Using KNX-Based Building Automation and Control Systems for Data Exfiltration"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9436-6067","authenticated-orcid":false,"given":"Vitor","family":"Graveto","sequence":"first","affiliation":[{"name":"University of Coimbra, CISUC, DEI, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9278-6503","authenticated-orcid":false,"given":"Tiago","family":"Cruz","sequence":"additional","affiliation":[{"name":"University of Coimbra, CISUC, DEI, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5079-8327","authenticated-orcid":false,"given":"Paulo","family":"Sim\u00f5es","sequence":"additional","affiliation":[{"name":"University of Coimbra, CISUC, DEI, Coimbra, Portugal"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/3ICT51146.2020.9311995"},{"key":"ref35","year":"2016","journal-title":"EN ISO 16484&#x2014;Building automation and control systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCA.2019.8899564"},{"key":"ref34","year":"2002"},{"key":"ref15","article-title":"Fansmitter: Acoustic data exfiltration from (speakerless) air-gapped computers","author":"guri","year":"2016","journal-title":"arXiv 1606 05915"},{"key":"ref37","year":"2009","journal-title":"KNX System Specifications&#x2014;Architecture Version 03 00 02"},{"key":"ref14","first-page":"1","article-title":"MOSQUITO: Covert ultrasonic transmissions between two air-gapped computers using speakerto- speaker communication","author":"guri","year":"2019","journal-title":"Proc IEEE Conf Dependable Secure Comput (DSC)"},{"key":"ref36","author":"brooks","year":"2017","journal-title":"Building Automation & Control Systems An Investigation into Vulnerabilities Current Practice & Security Management Best Practice"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.120"},{"key":"ref30","article-title":"Data exfiltration using building automation to bridge air gapped system","author":"tienteu","year":"2017","journal-title":"Proc IEEE Int Symp Hardw Orient Security Trust (HOST)"},{"key":"ref11","first-page":"525","article-title":"Covert channels using mobile device&#x2019;s magnetic field sensors","author":"matyunin","year":"2016","journal-title":"Proc Asia South Pac Des Autom Conf (ASP-DAC)"},{"key":"ref33","year":"2020","journal-title":"Bacnet website"},{"key":"ref10","first-page":"3","article-title":"On acoustic covert channels between airgapped systems","author":"carrara","year":"2014","journal-title":"Proc Int Symp Found Pract Security"},{"key":"ref32","year":"2020","journal-title":"The Legacy of KNX"},{"key":"ref2","year":"2021","journal-title":"Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities&#x2014;IC Tech Spec&#x2014;For ICD\/ICS 705&#x2014;Version 1 5 1"},{"key":"ref1","year":"2010","journal-title":"Intelligence Community Directive 705&#x2014;Physical and Technical Security Standards for Sensitive Compartmented Information Facilities"},{"key":"ref17","first-page":"58","article-title":"Air hopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies","author":"guri","year":"2014","journal-title":"Proc 9th IEEE Int Conf Malicious Unwanted Softw (MALCON)"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3238874"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-163"},{"key":"ref38","year":"2022","journal-title":"GoPacket Project Repository"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00227"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906972"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2018.00016"},{"key":"ref23","article-title":"Oops!&#x2022; &#x2022; &#x2022; I think I scanned a malware","author":"nassi","year":"2017","journal-title":"arXiv 1703 07751"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00118"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CMI48017.2019.8962137"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2938404"},{"key":"ref22","article-title":"HVACKer: Bridging the air-gap by attacking the air conditioning system","author":"mirsky","year":"2017","journal-title":"arXiv 1703 10454"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.26"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD46524.2019.00044"},{"key":"ref27","article-title":"aIR-jumper: Covert air-gap exfiltration\/infiltration via security cameras&infrared (IR)","author":"guri","year":"2017","journal-title":"arXiv 1709 05742"},{"key":"ref29","first-page":"7","article-title":"Sensorless, permissionless information exfiltration with Wi-Fi micro-jamming","author":"ogen","year":"2018","journal-title":"Proc 12th USENIX Conf Offensive Technol"},{"key":"ref8","first-page":"1","article-title":"Soft tempest&#x2014;An opportunity for NATO","author":"anderson","year":"1999","journal-title":"Proc Protecting NATO Inf Syst 21st Century"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/9781119644682"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.8.11.758-767"},{"key":"ref4","first-page":"53","article-title":"A practical attack against a KNXbased building automation system","author":"antonini","year":"2014","journal-title":"Proc 2nd Int Symp ICS SCADA Cyber Security Res"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102527"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545189"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3177230"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2018.10.006"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10194321\/10086593.pdf?arnumber=10086593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T18:00:23Z","timestamp":1692036023000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10086593\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,1]]},"references-count":40,"journal-issue":{"issue":"15"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3262873","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,1]]}}}