Filters








3,282 Hits in 3.5 sec

On Covert Acoustical Mesh Networks in Air [article]

Michael Hanspach, Michael Goetz
2014 arXiv   pre-print
Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system.  ...  It is shown that the concept of a covert acoustical mesh network renders many conventional security concepts useless, as acoustical communications are usually not considered.  ...  with access to the source code of an underwater networking software (based on the open JANUS waveform protocol) that we adapted for setting up a covert acoustical mesh network in air.  ... 
arXiv:1406.1213v1 fatcat:yngntnk6cbborbidrqinnho4de

Privacy Threats of Acoustic Covert Communication among Smart Mobile Devices

Li Duan, Kejia Zhang, Bo Cheng, Bingfei Ren, Weizhi Meng
2021 Wireless Communications and Mobile Computing  
The emerging, overclocking signal-based acoustic covert communication technique allows smart devices to communicate (without users' consent) utilizing their microphones and speakers in ultrasonic side  ...  We also analyze the feasibility of using audio frequencies (i.e., ≤18 kHz) to the acoustic covert communication and carry out the acoustic covert communication system by introducing the auditory masking  ...  Acoustic Covert Communication Based on Normal Frequency In this section, we study the feasibility of the acoustic covert communication based on normal frequency and reveal that imperceptible acoustic covert  ... 
doi:10.1155/2021/9179100 fatcat:ogjw5zmaonen3o674dmfo5fmz4

On Covert Acoustical Mesh Networks in Air

Michael Hanspach, Michael Goetz
2013 Journal of Communications  
Alongside the established radio emanations frequently used in network communications, optical or acoustical emanations could also be used as means for communications.  ...  It is shown that the concept of a covert acoustical mesh network renders many conventional security concepts useless, as acoustical communications are usually not considered.  ...  with access to the source code of an underwater networking software (based on the open JANUS waveform protocol) that we adapted for setting up a covert acoustical mesh network in air.  ... 
doi:10.12720/jcm.8.11.758-767 fatcat:bjj2tcrf6veohb2ihqzdzllwtu

Data Exfiltration of Ultrasonic Signal in Computer Security System: A Review

Farah H. A. Jabar, Janatul Islah Mohammad, Ahmad Faizal Mohd Zain, Abu Bakar Hasan
2018 Indonesian Journal of Electrical Engineering and Computer Science  
Acoustic attacks on ultrasonic signal emanated by electronic devices have long been investigated among researchers.  ...  There will be inclusions of practical applications already in existence as well as future studies in related fields</span><span lang="EN-US">.</span>  ...  Smarter design scheme need to be developed to deliver stealthy communication utilizing ultrasonic frequency range.  ... 
doi:10.11591/ijeecs.v10.i2.pp490-497 fatcat:qvcqd5ku4bhddluqkiaxdbllna

The development of pointing perception in infancy: Effects of communicative signals on covert shifts of attention

Moritz M. Daum, Julia Ulber, Gustaf Gredebäck
2013 Developmental Psychology  
In addition, the size of the cueing effect increased the more human and communicative the acoustic stimulus was.  ...  Infants were presented with still images of pointing hands (cue) in combination with an acoustic stimulus.  ...  Concerning the third question about development of pointing perception, the results of the 10-month-olds tested in Experiment 2 indicate that, in contrast to recent neurophysiological findings , in the  ... 
doi:10.1037/a0031111 pmid:23356522 fatcat:4uv6qkxlbzal7pk6yq37u2lhme

USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB [article]

Mordechai Guri, Matan Monitz, Yuval Elovici
2016 arXiv   pre-print
In recent years researchers have demonstrated how attackers could use USB connectors implanted with RF transmitters to exfiltrate data from secure, and even air-gapped, computers (e.g., COTTONMOUTH in  ...  Such methods require a hardware modification of the USB plug or device, in which a dedicated RF transmitter is embedded.  ...  A review of acoustic covert channels is provided in [11] . Optical covert channels have been discussed by Loughry and Umphress [12] .  ... 
arXiv:1608.08397v1 fatcat:ivvznaasvrdhrd4zetlq3dbftm

Mimicking Ship-radiated Noise with Chaos Signal for Covert Underwater Acoustic Communication

Shuhua Huang, Xiaogeng Hou, Weiwei Liu, Guangjie Liu, Yuewei Dai, Wen Tian
2020 IEEE Access  
As one of the important methods, underwater acoustic communication (UAC) has attracted extensive research in recent years.  ...  The scheme realizes covert underwater acoustic communication by disguising the underwater acoustic communication signal as dolphin sound.  ...  In order to improve the communication performance, the great variety of ship types and channel equalization method can be studied in the future.  ... 
doi:10.1109/access.2020.3027022 fatcat:un6sxwf5ofgy5lvn5ybvb4ehnq

Progress in speech decoding from the electrocorticogram

Shreya Chakrabarti, Hilary M. Sandberg, Jonathan S. Brumberg, Dean J. Krusienski
2015 Biomedical Engineering Letters  
Recent advances in neuroimaging methods have improved our ability to explore the neurological processes underlying speech and language.  ...  and communication disorders.  ...  ACKNOWLEDGEMENTS This work was supported in part by the National Science Foundation (1064912, 1451028) and the National Institute on Deafness and Other Communication Disorders (R03-DC011304).  ... 
doi:10.1007/s13534-015-0175-1 fatcat:6kptd6iie5a4lbmzc3d3z3yxba

DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise [article]

Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici
2016 arXiv   pre-print
Our method is unique in that, unlike other acoustic covert channels, it doesn't require the presence of speakers or audio hardware in the air-gapped computer.  ...  However, such acoustic communication relies on the availability of speakers on a computer.  ...  covert communication.  ... 
arXiv:1608.03431v1 fatcat:3avj5yxqxzf2fjimfhvedfbphi

BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness [article]

Mordechai Guri, Dima Bykhovsky, Yuval Elovici
2020 arXiv   pre-print
In this paper, we introduce an optical covert channel in which an attacker can leak (or, exfiltlrate) sensitive information from air-gapped computers through manipulations on the screen brightness.  ...  This covert channel is invisible and it works even while the user is working on the computer.  ...  TECHNICAL BACKGROUND Display-to-camera (D2C) communication is a subject of significant recent interest.  ... 
arXiv:2002.01078v1 fatcat:73egbp5efzbr7iqc4vp5stua3u

MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication [article]

Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici
2018 arXiv   pre-print
This enables 'headphones-to-headphones' covert communication, which is discussed for the first time in this paper.  ...  In this paper we show how two (or more) airgapped computers in the same room, equipped with passive speakers, headphones, or earphones can covertly exchange data via ultrasonic waves.  ...  Acoustic In acoustic covert channels, data is transmitted via inaudible, ultrasonic sound waves. Audio based communication between computers was reviewed by Madhavapeddy et al. in 2005 [38] .  ... 
arXiv:1803.03422v2 fatcat:lnpwl6oaq5cm3nohvulm6hrkpy

Covert timing channels codes for communication over interactive traffic

Negar Kiyavash, Todd Coleman
2009 2009 IEEE International Conference on Acoustics, Speech and Signal Processing  
This paper presents the first practical perfectly-secure steganography codes for covert communication via packet timings across interactive traffic relayed over network queuing systems.  ...  Inspired by this new class of codes, we use an alternative shaping technique that employs random dithers and construct provably secure steganographic codes for communication using packet timings in interactive  ...  Besides covert communication, recently a host of new security applications have arisen where it is desired to communicate -not by means of packets contents -but by utilizing the inter packet timings [  ... 
doi:10.1109/icassp.2009.4959876 dblp:conf/icassp/KiyavashC09 fatcat:oec5sqo5orcs3bdiunlmtayajm

Decoding Inner Speech Using Electrocorticography: Progress and Challenges Toward a Speech Prosthesis

Stephanie Martin, Iñaki Iturrate, José del R. Millán, Robert T. Knight, Brian N. Pasley
2018 Frontiers in Neuroscience  
In this review article, we describe the state of the art in decoding inner speech, ranging from early acoustic sound features, to higher order speech units.  ...  People that cannot communicate due to neurological disorders would benefit from a system that can infer internal speech directly from brain signals.  ...  ACKNOWLEDGMENTS This article is adapted from the following doctorate thesis: Understanding and decoding imagined speech using intracranial recordings in the human brain (Martin, 2017) .  ... 
doi:10.3389/fnins.2018.00422 pmid:29977189 pmcid:PMC6021529 fatcat:s2b7sj7lvnhxnjsu5gviyycrt4

Deconstructing phonetic transcription: Covert contrast, perceptual bias, and an extraterrestrial view ofVox Humana

Benjamin Munson, Jan Edwards, Sarah K. Schellinger, Mary E. Beckman, Marie K. Meyer
2010 Clinical Linguistics & Phonetics  
We present evidence from a new series of perception studies that covert contrast may be far more prevalent in children's speech than existing studies would suggest.  ...  The first section reviews the literature on cases where children whose speech appears to neutralize a contrast in the adult language are found on closer examination to produce a contrast (covert contrast  ...  We generously thank Kari Urberg-Carlson and Eden Kaiser for help with subject testing, and Jeff Holliday and Fangfang Li for help with the acoustic analyses in Table II.  ... 
doi:10.3109/02699200903532524 pmid:20345255 pmcid:PMC2941432 fatcat:mig3dinl3jhqtfq53xosbujwki

Superimposed training low probability of detection underwater communications

Fabio B Louza, Harry A DeFerrari
2020 Journal of the Acoustical Society of America  
This paper proposes a superimposed training method for low probability of detection underwater acoustic communications.  ...  Introduction In recent years, research on covert or low probability of detection (LPD) 1,2 underwater acoustic communications has increased due to their several applications.  ...  Conclusions The development of LPD underwater acoustic communication methods has been encouraged in recent years. This paper presents a new approach and verifies its suitability for LPD purposes.  ... 
doi:10.1121/10.0001934 pmid:33003891 fatcat:kt3pdlsy2vdw7h27qrqrjnatem
« Previous Showing results 1 — 15 out of 3,282 results