Taxonomy and challenges of out-of-band signal injection attacks and defenses
I Giechaskiel, K Rasmussen - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Recent research has shown that the integrity of sensor measurements can be violated
through out-of-band signal injection attacks. These attacks target the conversion process …
through out-of-band signal injection attacks. These attacks target the conversion process …
mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device
Earpiece mode of smartphones is often used for confidential communication. In this paper,
we proposed a remote (> 2m) and motion-resilient attack on smartphone earpiece. We …
we proposed a remote (> 2m) and motion-resilient attack on smartphone earpiece. We …
Milliear: Millimeter-wave acoustic eavesdropping with unconstrained vocabulary
P Hu, Y Ma, PS Santhalingam… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
As acoustic communication systems become more common in homes and offices,
eavesdropping brings significant security and privacy risks. Current approaches of acoustic …
eavesdropping brings significant security and privacy risks. Current approaches of acoustic …
Accear: Accelerometer acoustic eavesdropping with unconstrained vocabulary
With the increasing popularity of voice-based applications, acoustic eavesdropping has
become a serious threat to users' privacy. While on smartphones the access to microphones …
become a serious threat to users' privacy. While on smartphones the access to microphones …
Wearable microphone jamming
We engineered a wearable microphone jammer that is capable of disabling microphones in
its user's surroundings, including hidden microphones. Our device is based on a recent …
its user's surroundings, including hidden microphones. Our device is based on a recent …
mmecho: A mmwave-based acoustic eavesdropping method
Acoustic eavesdropping on private or confidential spaces poses a significant privacy threat.
While soundproof rooms can mitigate these risks to some extent, they are unable to counter …
While soundproof rooms can mitigate these risks to some extent, they are unable to counter …
Lamphone: Real-time passive sound recovery from light bulb vibrations
Recent studies have suggested various side-channel attacks for eavesdropping sound by
analyzing the side effects of sound waves on nearby objects (eg, a bag of chips and …
analyzing the side effects of sound waves on nearby objects (eg, a bag of chips and …
Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication
In this paper we show how two or more air-gapped computers in the same room, equipped
with passive speakers, headphones, or earphones can covertly exchange data via …
with passive speakers, headphones, or earphones can covertly exchange data via …
Hard drive of hearing: Disks that eavesdrop with a synthesized microphone
Security conscious individuals may take considerable measures to disable sensors in order
to protect their privacy. However, they often overlook the cyberphysical attack surface …
to protect their privacy. However, they often overlook the cyberphysical attack surface …
Watchdog: Detecting ultrasonic-based inaudible voice attacks to smart home systems
J Mao, S Zhu, X Dai, Q Lin, J Liu - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things is a critical infrastructure component as well as an enabling technology to
support the fast-developing cross-region, cross-application, and diversified collaborative …
support the fast-developing cross-region, cross-application, and diversified collaborative …