메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Bridging the air gap: Inaudible data exfiltration by insiders

Author keywords

Cybercrime; Data exfiltration; Inaudible sound; Insider threats

Indexed keywords

COMPUTER CRIME; COMPUTER HARDWARE; HARDWARE; INFORMATION SYSTEMS;

EID: 84905969331     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (36)

References (13)
  • 2
    • 77957695303 scopus 로고    scopus 로고
    • Organised crime groups in cyberspace: A typology
    • Choo, K.-K. R. 2008. "Organised crime groups in cyberspace: a typology," Trends in Organized Crime 11(3), pp. 270-295.
    • (2008) Trends In Organized Crime , vol.11 , Issue.3 , pp. 270-295
    • Choo, K.-K.R.1
  • 3
    • 46449097423 scopus 로고    scopus 로고
    • Criminal exploitation of online systems by organised crime groups
    • Choo, K.-K. R., and Smith, R. G. 2008. "Criminal exploitation of online systems by organised crime groups," Asian Journal of Criminology 3(1), pp. 37-59.
    • (2008) Asian Journal of Criminology , vol.3 , Issue.1 , pp. 37-59
    • Choo, K.-K.R.1    Smith, R.G.2
  • 6
    • 33747629222 scopus 로고    scopus 로고
    • Data exfiltration and covert channels
    • Giani, A., Berk, V. H., and Cybenko, G. V. Year. "Data exfiltration and covert channels," SPIE2006, pp. 1-11.
    • SPIE2006 , pp. 1-11
    • Giani, A.1    Berk, V.H.2    Cybenko, G.V.3
  • 7
    • 84912006012 scopus 로고    scopus 로고
    • Meet "badBIOS," the mysterious Mac and PC malware that jumps airgaps
    • Goodin, D. 2013. "Meet "badBIOS," the mysterious Mac and PC malware that jumps airgaps," Ars Technica.
    • (2013) Ars Technica
    • Goodin, D.1
  • 8
    • 84905979796 scopus 로고    scopus 로고
    • An example demonstrating binary FSK
    • Ktims, Wikipedia
    • Ktims 2006. "An example demonstrating binary FSK," in Wikipedia Commons, Wikipedia.
    • (2006) Wikipedia Commons
  • 9
    • 84862789277 scopus 로고    scopus 로고
    • Behavioral hearing thresholds between 0.125 and 20 kHz using depth-compensated ear simulator calibration
    • May-Jun
    • Lee, J., Dhar, S., Abel, R., Banakis, R., Grolley, E., Lee, J., Zecker, S., and Siegel, J. 2012. "Behavioral hearing thresholds between 0.125 and 20 kHz using depth-compensated ear simulator calibration," Ear Hear (33:3) May-Jun, pp 315-329.
    • (2012) Ear Hear , vol.33 , Issue.3 , pp. 315-329
    • Lee, J.1    Dhar, S.2    Abel, R.3    Banakis, R.4    Grolley, E.5    Lee, J.6    Zecker, S.7    Siegel, J.8
  • 10
    • 62349119577 scopus 로고
    • NSTISSAM TEMPEST 2-95, National Security Telecommunications and Information Systems Security
    • McConnell, J. M. 1995. "Red/Black Installation Guidance," in NSTISSAM TEMPEST 2-95, National Security Telecommunications and Information Systems Security.
    • (1995) Red/Black Installation Guidance
    • McConnell, J.M.1
  • 11
    • 84867834950 scopus 로고    scopus 로고
    • Deconstructing Flame: The limitations of traditional defences
    • 2012:10
    • Munro, K. 2012. "Deconstructing Flame: the limitations of traditional defences," Computer Fraud & Security (2012:10), pp 8-11.
    • (2012) Computer Fraud & Security , pp. 8-11
    • Munro, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.