{"id":"https:\/\/openalex.org\/W4306704957","doi":"https:\/\/doi.org\/10.48550\/arxiv.2210.07531","title":"Let's Talk Through Physics! Covert Cyber-Physical Data Exfiltration on Air-Gapped Edge Devices","display_name":"Let's Talk Through Physics! Covert Cyber-Physical Data Exfiltration on Air-Gapped Edge Devices","publication_year":2022,"publication_date":"2022-10-14","ids":{"openalex":"https:\/\/openalex.org\/W4306704957","doi":"https:\/\/doi.org\/10.48550\/arxiv.2210.07531"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2210.07531","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2210.07531","pdf_url":"https:\/\/arxiv.org\/pdf\/2210.07531","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https:\/\/arxiv.org\/pdf\/2210.07531","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5102845929","display_name":"Matthew Chan","orcid":"https:\/\/orcid.org\/0009-0009-1704-1013"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chan, Matthew","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5112874117","display_name":"Nathaniel Snyder","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Snyder, Nathaniel","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5074233393","display_name":"Marcus Lucas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lucas, Marcus","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5100645570","display_name":"Luis Garc\u00eda","orcid":"https:\/\/orcid.org\/0009-0002-5225-1787"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Garcia, Luis","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5082105260","display_name":"Oleg Sokolsky","orcid":"https:\/\/orcid.org\/0000-0001-5282-0658"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sokolsky, Oleg","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5054356243","display_name":"James Weimer","orcid":"https:\/\/orcid.org\/0000-0001-8167-9163"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Weimer, James","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5030456600","display_name":"Insup Lee","orcid":"https:\/\/orcid.org\/0000-0003-2672-1132"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lee, Insup","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5047674203","display_name":"Paulo Tabuada","orcid":"https:\/\/orcid.org\/0000-0002-3417-0951"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tabuada, Paulo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5059269246","display_name":"Saman Zonouz","orcid":"https:\/\/orcid.org\/0000-0001-9047-4047"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zonouz, Saman","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5074563122","display_name":"Mani Srivastava","orcid":"https:\/\/orcid.org\/0000-0002-3782-9192"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Srivastava, Mani","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":10,"corresponding_author_ids":["https:\/\/openalex.org\/A5102845929"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.996999979019165,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.996999979019165,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9966999888420105,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1708","display_name":"Hardware and Architecture"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958999752998352,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1711","display_name":"Signal Processing"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/cyber-physical-system","display_name":"Cyber-physical system","score":0.8392940163612366},{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.6686478853225708},{"id":"https:\/\/openalex.org\/keywords\/covert","display_name":"Covert","score":0.6435995101928711},{"id":"https:\/\/openalex.org\/keywords\/covert-channel","display_name":"Covert channel","score":0.6363945603370667},{"id":"https:\/\/openalex.org\/keywords\/physical-system","display_name":"Physical system","score":0.5182173848152161},{"id":"https:\/\/openalex.org\/keywords\/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4982411861419678},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.4712914526462555},{"id":"https:\/\/openalex.org\/keywords\/state","display_name":"State (computer science)","score":0.41521236300468445},{"id":"https:\/\/openalex.org\/keywords\/artificial-intelligence","display_name":"Artificial intelligence","score":0.17191317677497864}],"concepts":[{"id":"https:\/\/openalex.org\/C179768478","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.8392940163612366},{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.6686478853225708},{"id":"https:\/\/openalex.org\/C2779338814","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q5179285","display_name":"Covert","level":2,"score":0.6435995101928711},{"id":"https:\/\/openalex.org\/C29024540","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1476964","display_name":"Covert channel","level":5,"score":0.6363945603370667},{"id":"https:\/\/openalex.org\/C116672817","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1454986","display_name":"Physical system","level":2,"score":0.5182173848152161},{"id":"https:\/\/openalex.org\/C162307627","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4982411861419678},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.4712914526462555},{"id":"https:\/\/openalex.org\/C48103436","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q599031","display_name":"State (computer science)","level":2,"score":0.41521236300468445},{"id":"https:\/\/openalex.org\/C154945302","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17191317677497864},{"id":"https:\/\/openalex.org\/C138885662","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q5891","display_name":"Philosophy","level":0,"score":0},{"id":"https:\/\/openalex.org\/C11413529","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8366","display_name":"Algorithm","level":1,"score":0},{"id":"https:\/\/openalex.org\/C111919701","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q9135","display_name":"Operating system","level":1,"score":0},{"id":"https:\/\/openalex.org\/C41895202","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8162","display_name":"Linguistics","level":1,"score":0},{"id":"https:\/\/openalex.org\/C79974875","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q483639","display_name":"Cloud computing","level":2,"score":0},{"id":"https:\/\/openalex.org\/C103377522","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3493999","display_name":"Security information and event management","level":4,"score":0},{"id":"https:\/\/openalex.org\/C184842701","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q370563","display_name":"Cloud computing security","level":3,"score":0},{"id":"https:\/\/openalex.org\/C121332964","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q413","display_name":"Physics","level":0,"score":0},{"id":"https:\/\/openalex.org\/C62520636","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q944","display_name":"Quantum mechanics","level":1,"score":0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2210.07531","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2210.07531","pdf_url":"https:\/\/arxiv.org\/pdf\/2210.07531","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"doi:10.48550\/arxiv.2210.07531","is_oa":true,"landing_page_url":"https:\/\/doi.org\/10.48550\/arxiv.2210.07531","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https:\/\/openalex.org\/licenses\/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2210.07531","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2210.07531","pdf_url":"https:\/\/arxiv.org\/pdf\/2210.07531","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https:\/\/metadata.un.org\/sdg\/9","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https:\/\/openalex.org\/W2409612194","https:\/\/openalex.org\/W4224042389","https:\/\/openalex.org\/W20460883","https:\/\/openalex.org\/W174282171","https:\/\/openalex.org\/W1587013156","https:\/\/openalex.org\/W2994120531","https:\/\/openalex.org\/W2108326965","https:\/\/openalex.org\/W1420645157","https:\/\/openalex.org\/W4239080508","https:\/\/openalex.org\/W3017360834"],"abstract_inverted_index":{"Although":[0,55],"organizations":[1],"are":[2,86,109],"continuously":[3,19],"making":[4],"concerted":[5],"efforts":[6],"to":[7,25,102,133,145],"harden":[8],"their":[9],"systems":[10,76],"against":[11],"network":[12,183],"attacks":[13,70],"by":[14,49,90],"air-gapping":[15],"critical":[16],"systems,":[17],"attackers":[18,33],"adapt":[20],"and":[21,128,167],"uncover":[22],"covert":[23,67,79,120,215],"channels":[24,80,84,108],"exfiltrate":[26,134],"data":[27,40,51,101,121,135,156,170],"from":[28,41,157],"air-gapped":[29],"systems.":[30],"For":[31],"instance,":[32],"have":[34,71],"demonstrated":[35],"the":[36,78,91,158,201,212,220],"feasibility":[37],"of":[38,59,130,203,214,222],"exfiltrating":[39,50,154],"a":[42,46,56,137,143,162,180,204,223],"computer":[43],"sitting":[44],"in":[45,136,219],"Faraday":[47],"cage":[48],"using":[52],"magnetic":[53],"fields.":[54],"large":[57],"body":[58],"work":[60],"has":[61],"recently":[62],"emerged":[63],"highlighting":[64],"various":[65],"physical":[66,83,106,190],"channels,":[68],"these":[69],"mostly":[72],"targeted":[73],"open-loop":[74],"cyber-physical":[75,103,126,147,172,216],"where":[77],"exist":[81],"on":[82,179,189,195],"that":[85,123,184],"not":[87],"being":[88],"monitored":[89,111],"victim.":[92],"Network":[93],"architectures":[94],"such":[95],"as":[96,192,194],"fog":[97],"computing":[98],"push":[99],"sensitive":[100,155,169],"edge":[104],"devices--whose":[105],"side":[107],"typically":[110],"via":[112],"state":[113,148,226],"estimation.":[114,227],"In":[115],"this":[116],"paper,":[117],"we":[118,141,210],"formalize":[119,211],"exfiltration":[122,218],"uses":[124],"existing":[125],"models":[127],"infrastructure":[129],"individual":[131],"devices":[132],"stealthy":[138],"manner,":[139],"i.e.,":[140],"propose":[142,161],"method":[144],"circumvent":[146],"estimation":[149],"intrusion":[150],"detection":[151],"techniques":[152],"while":[153],"network.":[159],"We":[160,175],"generalized":[163],"model":[164],"for":[165,200],"encoding":[166],"decoding":[168],"within":[171],"control":[173,198,202],"loops.":[174],"evaluate":[176],"our":[177],"approach":[178],"distributed":[181],"IoT":[182],"includes":[185],"computation":[186],"nodes":[187],"residing":[188],"drones":[191],"well":[193],"an":[196],"industrial":[197],"system":[199],"robotic":[205],"arm.":[206],"Unlike":[207],"prior":[208],"works,":[209],"constraints":[213],"channel":[217],"presence":[221],"defender":[224],"performing":[225]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}