A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
On Covert Acoustical Mesh Networks in Air
[article]
2014
arXiv
pre-print
Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. ...
It is shown that the concept of a covert acoustical mesh network renders many conventional security concepts useless, as acoustical communications are usually not considered. ...
with access to the source code of an underwater networking software (based on the open JANUS waveform protocol) that we adapted for setting up a covert acoustical mesh network in air. ...
arXiv:1406.1213v1
fatcat:yngntnk6cbborbidrqinnho4de
Privacy Threats of Acoustic Covert Communication among Smart Mobile Devices
2021
Wireless Communications and Mobile Computing
The emerging, overclocking signal-based acoustic covert communication technique allows smart devices to communicate (without users' consent) utilizing their microphones and speakers in ultrasonic side ...
We also analyze the feasibility of using audio frequencies (i.e., ≤18 kHz) to the acoustic covert communication and carry out the acoustic covert communication system by introducing the auditory masking ...
Acoustic Covert Communication Based on Normal Frequency In this section, we study the feasibility of the acoustic covert communication based on normal frequency and reveal that imperceptible acoustic covert ...
doi:10.1155/2021/9179100
fatcat:ogjw5zmaonen3o674dmfo5fmz4
On Covert Acoustical Mesh Networks in Air
2013
Journal of Communications
Alongside the established radio emanations frequently used in network communications, optical or acoustical emanations could also be used as means for communications. ...
It is shown that the concept of a covert acoustical mesh network renders many conventional security concepts useless, as acoustical communications are usually not considered. ...
with access to the source code of an underwater networking software (based on the open JANUS waveform protocol) that we adapted for setting up a covert acoustical mesh network in air. ...
doi:10.12720/jcm.8.11.758-767
fatcat:bjj2tcrf6veohb2ihqzdzllwtu
Data Exfiltration of Ultrasonic Signal in Computer Security System: A Review
2018
Indonesian Journal of Electrical Engineering and Computer Science
Acoustic attacks on ultrasonic signal emanated by electronic devices have long been investigated among researchers. ...
There will be inclusions of practical applications already in existence as well as future studies in related fields</span><span lang="EN-US">.</span> ...
Smarter design scheme need to be developed to deliver stealthy communication utilizing ultrasonic frequency range. ...
doi:10.11591/ijeecs.v10.i2.pp490-497
fatcat:qvcqd5ku4bhddluqkiaxdbllna
The development of pointing perception in infancy: Effects of communicative signals on covert shifts of attention
2013
Developmental Psychology
In addition, the size of the cueing effect increased the more human and communicative the acoustic stimulus was. ...
Infants were presented with still images of pointing hands (cue) in combination with an acoustic stimulus. ...
Concerning the third question about development of pointing perception, the results of the 10-month-olds tested in Experiment 2 indicate that, in contrast to recent neurophysiological findings , in the ...
doi:10.1037/a0031111
pmid:23356522
fatcat:4uv6qkxlbzal7pk6yq37u2lhme
USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB
[article]
2016
arXiv
pre-print
In recent years researchers have demonstrated how attackers could use USB connectors implanted with RF transmitters to exfiltrate data from secure, and even air-gapped, computers (e.g., COTTONMOUTH in ...
Such methods require a hardware modification of the USB plug or device, in which a dedicated RF transmitter is embedded. ...
A review of acoustic covert channels is provided in [11] . Optical covert channels have been discussed by Loughry and Umphress [12] . ...
arXiv:1608.08397v1
fatcat:ivvznaasvrdhrd4zetlq3dbftm
Mimicking Ship-radiated Noise with Chaos Signal for Covert Underwater Acoustic Communication
2020
IEEE Access
As one of the important methods, underwater acoustic communication (UAC) has attracted extensive research in recent years. ...
The scheme realizes covert underwater acoustic communication by disguising the underwater acoustic communication signal as dolphin sound. ...
In order to improve the communication performance, the great variety of ship types and channel equalization method can be studied in the future. ...
doi:10.1109/access.2020.3027022
fatcat:un6sxwf5ofgy5lvn5ybvb4ehnq
Progress in speech decoding from the electrocorticogram
2015
Biomedical Engineering Letters
Recent advances in neuroimaging methods have improved our ability to explore the neurological processes underlying speech and language. ...
and communication disorders. ...
ACKNOWLEDGEMENTS This work was supported in part by the National Science Foundation (1064912, 1451028) and the National Institute on Deafness and Other Communication Disorders (R03-DC011304). ...
doi:10.1007/s13534-015-0175-1
fatcat:6kptd6iie5a4lbmzc3d3z3yxba
DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise
[article]
2016
arXiv
pre-print
Our method is unique in that, unlike other acoustic covert channels, it doesn't require the presence of speakers or audio hardware in the air-gapped computer. ...
However, such acoustic communication relies on the availability of speakers on a computer. ...
covert communication. ...
arXiv:1608.03431v1
fatcat:3avj5yxqxzf2fjimfhvedfbphi
BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness
[article]
2020
arXiv
pre-print
In this paper, we introduce an optical covert channel in which an attacker can leak (or, exfiltlrate) sensitive information from air-gapped computers through manipulations on the screen brightness. ...
This covert channel is invisible and it works even while the user is working on the computer. ...
TECHNICAL BACKGROUND Display-to-camera (D2C) communication is a subject of significant recent interest. ...
arXiv:2002.01078v1
fatcat:73egbp5efzbr7iqc4vp5stua3u
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication
[article]
2018
arXiv
pre-print
This enables 'headphones-to-headphones' covert communication, which is discussed for the first time in this paper. ...
In this paper we show how two (or more) airgapped computers in the same room, equipped with passive speakers, headphones, or earphones can covertly exchange data via ultrasonic waves. ...
Acoustic In acoustic covert channels, data is transmitted via inaudible, ultrasonic sound waves. Audio based communication between computers was reviewed by Madhavapeddy et al. in 2005 [38] . ...
arXiv:1803.03422v2
fatcat:lnpwl6oaq5cm3nohvulm6hrkpy
Covert timing channels codes for communication over interactive traffic
2009
2009 IEEE International Conference on Acoustics, Speech and Signal Processing
This paper presents the first practical perfectly-secure steganography codes for covert communication via packet timings across interactive traffic relayed over network queuing systems. ...
Inspired by this new class of codes, we use an alternative shaping technique that employs random dithers and construct provably secure steganographic codes for communication using packet timings in interactive ...
Besides covert communication, recently a host of new security applications have arisen where it is desired to communicate -not by means of packets contents -but by utilizing the inter packet timings [ ...
doi:10.1109/icassp.2009.4959876
dblp:conf/icassp/KiyavashC09
fatcat:oec5sqo5orcs3bdiunlmtayajm
Decoding Inner Speech Using Electrocorticography: Progress and Challenges Toward a Speech Prosthesis
2018
Frontiers in Neuroscience
In this review article, we describe the state of the art in decoding inner speech, ranging from early acoustic sound features, to higher order speech units. ...
People that cannot communicate due to neurological disorders would benefit from a system that can infer internal speech directly from brain signals. ...
ACKNOWLEDGMENTS This article is adapted from the following doctorate thesis: Understanding and decoding imagined speech using intracranial recordings in the human brain (Martin, 2017) . ...
doi:10.3389/fnins.2018.00422
pmid:29977189
pmcid:PMC6021529
fatcat:s2b7sj7lvnhxnjsu5gviyycrt4
Deconstructing phonetic transcription: Covert contrast, perceptual bias, and an extraterrestrial view ofVox Humana
2010
Clinical Linguistics & Phonetics
We present evidence from a new series of perception studies that covert contrast may be far more prevalent in children's speech than existing studies would suggest. ...
The first section reviews the literature on cases where children whose speech appears to neutralize a contrast in the adult language are found on closer examination to produce a contrast (covert contrast ...
We generously thank Kari Urberg-Carlson and Eden Kaiser for help with subject testing, and Jeff Holliday and Fangfang Li for help with the acoustic analyses in Table II. ...
doi:10.3109/02699200903532524
pmid:20345255
pmcid:PMC2941432
fatcat:mig3dinl3jhqtfq53xosbujwki
Superimposed training low probability of detection underwater communications
2020
Journal of the Acoustical Society of America
This paper proposes a superimposed training method for low probability of detection underwater acoustic communications. ...
Introduction In recent years, research on covert or low probability of detection (LPD) 1,2 underwater acoustic communications has increased due to their several applications. ...
Conclusions The development of LPD underwater acoustic communication methods has been encouraged in recent years. This paper presents a new approach and verifies its suitability for LPD purposes. ...
doi:10.1121/10.0001934
pmid:33003891
fatcat:kt3pdlsy2vdw7h27qrqrjnatem
« Previous
Showing results 1 — 15 out of 3,282 results