Air-gap Limitations and Bypass Techniques: “Command and Control” using Smart Electromagnetic Interferences

Chaouki Kasmi, José Lopes Esteves, Philippe Valembois


Air gaps are generally considered to be a very efficient information security protection. However, this technique also showed limitations, involving finding covert channels for bridging the air gap. Interestingly, recent publications have pointed out that a smart use of the intentional electromagnetic interferences introduced new threats for information security. In this paper, an innovative way for remotely communicating with a malware already installed on a computer by involving the induced perturbations is discussed leading to the design of a new air gap bridging covert channel.

Texte intégral :

PDF (English)



  • Il n'y a présentement aucun renvoi.

Licence Creative Commons
Ce(tte) œuvre est mise à disposition selon les termes de la Licence Creative Commons Attribution 4.0 International.

CECyF 2015 - Centre Expert contre la Cybercriminalité Français - CybIN