This dissertation is focused on developing a sub-area of acoustics that we call inaudible acoustics. We have developed two core capabilities, (1) BackDoor and (2) Ripple, and demonstrated their use in various mobile and IoT applications. In BackDoor, we synthesize ultrasound signals that are inaudible to humans yet naturally recordable by all microphones. Importantly, the microphone does not require any modification, enabling billions of microphone-enabled devices, including phones, laptops, voice assistants, and IoT devices, to leverage the capability. Example applications include acoustic data beacons, acoustic watermarking, and spy-microphone jamming. In Ripple, we develop modulation and sensing techniques for vibratory signals that trav...
Although authentication of users of digital voice-based systems has been addressed by much research ...
Covert channels can be used to circumvent system and network policies by establishing communications...
Nowadays users often possess a variety of electronic devices for communication and entertainment. In...
This dissertation is focused on developing a sub-area of acoustics that we call inaudible acoustics....
Loudspeakers are widely used in conferencing and infotainment systems. Private information leakage f...
Abstract: The topic of covert acoustical communication in air has produced public attention, lately....
Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberatt...
The topic of covert acoustical communication in air has produced public attention, lately. In 2013, ...
The number of audio-sensing-related applications is growing rapidly, such as the voice assistant as ...
With the advancement of mobile sensing and pervasive computing, extensive research is being carried ...
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible a...
Secure Device-to-Device (D2D) communication is becoming increasingly important with the ever-growing...
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible a...
This work explores backdoor attacks for automatic speech recognition systems where we inject inaudib...
Abstract — Covert channels can be used to circumvent system and network policies by establishing com...
Although authentication of users of digital voice-based systems has been addressed by much research ...
Covert channels can be used to circumvent system and network policies by establishing communications...
Nowadays users often possess a variety of electronic devices for communication and entertainment. In...
This dissertation is focused on developing a sub-area of acoustics that we call inaudible acoustics....
Loudspeakers are widely used in conferencing and infotainment systems. Private information leakage f...
Abstract: The topic of covert acoustical communication in air has produced public attention, lately....
Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberatt...
The topic of covert acoustical communication in air has produced public attention, lately. In 2013, ...
The number of audio-sensing-related applications is growing rapidly, such as the voice assistant as ...
With the advancement of mobile sensing and pervasive computing, extensive research is being carried ...
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible a...
Secure Device-to-Device (D2D) communication is becoming increasingly important with the ever-growing...
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible a...
This work explores backdoor attacks for automatic speech recognition systems where we inject inaudib...
Abstract — Covert channels can be used to circumvent system and network policies by establishing com...
Although authentication of users of digital voice-based systems has been addressed by much research ...
Covert channels can be used to circumvent system and network policies by establishing communications...
Nowadays users often possess a variety of electronic devices for communication and entertainment. In...