Acknowledgement
본 연구는 2023년 국방과학연구소에서 주관하는 미래도전국방기술 연구개발사업(2단계)(UD230020TD)의 지원을 받아 수행되었습니다. 본 연구는 과학기술정보통신부 및 정보통신기획평가원의 정보통신방송혁신인재양성(메타버스융합대학원)사업 연구 결과로 수행되었음(IITP-2023-RS-2023-00254529).
References
- S. Cabuk, et al., "IP covert channel detection," ACM Trans. Inf. Syst. Secur., vol. 12, no. 4, pp. 1-29, 2009. https://doi.org/10.1145/1513601.1513604
- "Covert storage channel". [Online]. Available: https://owasp.org/www-community/vulnerabilities/Covert_storage_channel. [Accessed: 2024-04-24].
- M. Guri, et al., "Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication," in Proc. IEEE Conf. Dependable Secure Comput., pp. 1-8, 2018.
- M. Guri, et al., "Fansmitter: Acoustic data exfiltration from (speakerless) air-gapped computers,"arXiv preprint arXiv:1606.05915, 2016.
- M. Guri, "Gairoscope: Leaking data from air-gapped computers to nearby smartphones using speakers-to-gyro communication," in Proc. 18th Int. Conf. Privacy, Security and Trust (PST), pp. 1-10, 2021.