Abstract — Computer equipment produces a wide range of emanations in the visible, electromagnetic, and acoustic spectra. It is well known that electromagnetic emanations can reveal information about the operations being performed by a machine, and it has recently been shown that acoustic emanations can do the same. Additionally, techniques have been developed to manipulate electromagnetic emanations so that they surreptitiously transmit data to a remote receiver. In this paper, we similarly demonstrate how acoustic emanations can be manipulated to transmit arbitrary data and show how this technique can be used to create a practical, software-only acoustic keylogger. Finally, we recommend countermeasures to prevent such an attack from being ...
Loudspeakers are widely used in conferencing and infotainment systems. Private information leakage f...
Abstract: The topic of covert acoustical communication in air has produced public attention, lately....
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channe...
This paper gives an overview and threat analysis of eavesdropping attacks based on the emanations gi...
Abstract. It is well known that eavesdroppers can reconstruct video screen content from radio freque...
Abstract. It is well known that eavesdroppers can reconstruct video screen content from radio freque...
Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberatt...
This poster presents how a disconnected computer, that has no network access, can be attacked to ret...
This dissertation is focused on developing a sub-area of acoustics that we call inaudible acoustics....
Computer keyboards are often used to transmit confidential data such as passwords. Since they contai...
Abstract—The possibility of uncovering the sequence of pressed keys in a PIN-pad, ATM or other devic...
The ubiquity of printers in modern office spaces provides our motivation to design a covert channel ...
It is crucial for public users and service providers to stay abreast of the progress and trends on d...
Covert channels can be used to circumvent system and network policies by establishing communications...
Abstract — Covert channels can be used to circumvent system and network policies by establishing com...
Loudspeakers are widely used in conferencing and infotainment systems. Private information leakage f...
Abstract: The topic of covert acoustical communication in air has produced public attention, lately....
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channe...
This paper gives an overview and threat analysis of eavesdropping attacks based on the emanations gi...
Abstract. It is well known that eavesdroppers can reconstruct video screen content from radio freque...
Abstract. It is well known that eavesdroppers can reconstruct video screen content from radio freque...
Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberatt...
This poster presents how a disconnected computer, that has no network access, can be attacked to ret...
This dissertation is focused on developing a sub-area of acoustics that we call inaudible acoustics....
Computer keyboards are often used to transmit confidential data such as passwords. Since they contai...
Abstract—The possibility of uncovering the sequence of pressed keys in a PIN-pad, ATM or other devic...
The ubiquity of printers in modern office spaces provides our motivation to design a covert channel ...
It is crucial for public users and service providers to stay abreast of the progress and trends on d...
Covert channels can be used to circumvent system and network policies by establishing communications...
Abstract — Covert channels can be used to circumvent system and network policies by establishing com...
Loudspeakers are widely used in conferencing and infotainment systems. Private information leakage f...
Abstract: The topic of covert acoustical communication in air has produced public attention, lately....
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channe...