If you're using a standard 1XXXX... address? Absolutely. "I control my own machine" is a fundamental assumption in normal use.
If you're using multisig addresses with physical separation of keys (e.g. your computer signs the transaction and sends it to your phone, your phone co-signs and submits), this attack is defeated unless both systems are compromised by the same attacker. The code to support such addresses was committed to bitcoin-qt over a year ago (it's why some addresses look like 3XXXX...), but support for the process itself is thin on the ground.
Of course, from a practical perspective, airgap-jumping attacks are generally targeted at a known configuration. If someone is deploying that sort of attack against you, they can probably break into your phone too.
air gap attacks you would just have to know os + usb, thats pretty much down to osx, win for a lot.
Your multi sig would make it hard if you you used 2 different USB as the two sig data's would never be exposed in the same time frame. So that would be a very hard to attack this. essentially you would need 3 computers.