Abstract — Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. We con-struct a covert channel between different computing systems that utilizes audio modulation/demodulation to exchange data between the computing systems over the air medium. The underlying network stack is based on a communication system that was orig-inally designed for robust underwater communication. We adapt the communication system to implement covert and stealthy communications by utilizing the ultrasonic frequency range. We further demonstrate how the scenario of covert acoustical communication over the air medium can be extended to multi-hop communic...
The ubiquity of printers in modern office spaces provides our motivation to design a covert channel ...
Underwater Acoustic Networks (UANs) have long been recognized as an instrumental technology in vario...
Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberatt...
Covert channels can be used to circumvent system and network policies by establishing communications...
The topic of covert acoustical communication in air has produced public attention, lately. In 2013, ...
Abstract: The topic of covert acoustical communication in air has produced public attention, lately....
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channe...
Advances in underwater acoustic telemetry have paved the way for emerging technologies, such as unde...
This dissertation is focused on developing a sub-area of acoustics that we call inaudible acoustics....
Loudspeakers are widely used in conferencing and infotainment systems. Private information leakage f...
Abstract—This work proposes an audio data hiding system that hides information into signals not know...
Nowadays, in today’s society based on a wide range of the technical and computing devices, it opens ...
We present a first detailed survey on underwater and air-water (A-W) wireless communication networks...
This poster presents how a disconnected computer, that has no network access, can be attacked to ret...
With the growing use of underwater acoustic communications and the recent adoption of standards in t...
The ubiquity of printers in modern office spaces provides our motivation to design a covert channel ...
Underwater Acoustic Networks (UANs) have long been recognized as an instrumental technology in vario...
Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberatt...
Covert channels can be used to circumvent system and network policies by establishing communications...
The topic of covert acoustical communication in air has produced public attention, lately. In 2013, ...
Abstract: The topic of covert acoustical communication in air has produced public attention, lately....
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channe...
Advances in underwater acoustic telemetry have paved the way for emerging technologies, such as unde...
This dissertation is focused on developing a sub-area of acoustics that we call inaudible acoustics....
Loudspeakers are widely used in conferencing and infotainment systems. Private information leakage f...
Abstract—This work proposes an audio data hiding system that hides information into signals not know...
Nowadays, in today’s society based on a wide range of the technical and computing devices, it opens ...
We present a first detailed survey on underwater and air-water (A-W) wireless communication networks...
This poster presents how a disconnected computer, that has no network access, can be attacked to ret...
With the growing use of underwater acoustic communications and the recent adoption of standards in t...
The ubiquity of printers in modern office spaces provides our motivation to design a covert channel ...
Underwater Acoustic Networks (UANs) have long been recognized as an instrumental technology in vario...
Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberatt...