19,983 research outputs found

    Short-range ultrasonic communications in air using quadrature modulation

    Get PDF
    A study has been undertaken of ultrasonic communications methods in air, using a quadrature modulation method. Simulations were first performed to establish the likely performance of quadrature phase shift keying over the limited bandwidth available in an ultrasonic system. Quadrature phase shift keying modulation was then implemented within an experimental communication system, using capacitive ultrasonic sources and receivers. The results show that such a system is feasible in principle for communications over distances of several meters, using frequencies in the 200 to 400 kHz range

    DolphinAtack: Inaudible Voice Commands

    Full text link
    Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems(VCS). Prior work on attacking VCS shows that the hidden voice commands that are incomprehensible to people can control the systems. Hidden voice commands, though hidden, are nonetheless audible. In this work, we design a completely inaudible attack, DolphinAttack, that modulates voice commands on ultrasonic carriers (e.g., f > 20 kHz) to achieve inaudibility. By leveraging the nonlinearity of the microphone circuits, the modulated low frequency audio commands can be successfully demodulated, recovered, and more importantly interpreted by the speech recognition systems. We validate DolphinAttack on popular speech recognition systems, including Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa. By injecting a sequence of inaudible voice commands, we show a few proof-of-concept attacks, which include activating Siri to initiate a FaceTime call on iPhone, activating Google Now to switch the phone to the airplane mode, and even manipulating the navigation system in an Audi automobile. We propose hardware and software defense solutions. We validate that it is feasible to detect DolphinAttack by classifying the audios using supported vector machine (SVM), and suggest to re-design voice controllable systems to be resilient to inaudible voice command attacks.Comment: 15 pages, 17 figure

    POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers

    Get PDF
    It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of loudspeakers can be strictly forbidden. Such audio-less systems are considered to be \textit{audio-gapped}, and hence immune to acoustic covert channels. In this paper, we introduce a technique that enable attackers leak data acoustically from air-gapped and audio-gapped systems. Our developed malware can exploit the computer power supply unit (PSU) to play sounds and use it as an out-of-band, secondary speaker with limited capabilities. The malicious code manipulates the internal \textit{switching frequency} of the power supply and hence controls the sound waveforms generated from its capacitors and transformers. Our technique enables producing audio tones in a frequency band of 0-24khz and playing audio streams (e.g., WAV) from a computer power supply without the need for audio hardware or speakers. Binary data (files, keylogging, encryption keys, etc.) can be modulated over the acoustic signals and sent to a nearby receiver (e.g., smartphone). We show that our technique works with various types of systems: PC workstations and servers, as well as embedded systems and IoT devices that have no audio hardware at all. We provide technical background and discuss implementation details such as signal generation and data modulation. We show that the POWER-SUPPLaY code can operate from an ordinary user-mode process and doesn't need any hardware access or special privileges. Our evaluation shows that using POWER-SUPPLaY, sensitive data can be exfiltrated from air-gapped and audio-gapped systems from a distance of five meters away at a maximal bit rates of 50 bit/sec

    Neutrons from Piezonuclear Reactions

    Full text link
    We report the results obtained by cavitating water solutions of iron salts (iron chloride and iron nitrate) with different concentrations at different ultrasound powers. In all cases we detected a neutron radiation well higher than the background level. The neutron production is perfectly reproducible and can at some extent be controlled. These evidences for neutron emission generated by cavitation support some preliminary clues for the possibility of piezonuclear reactions (namely nuclear reactions induced by pressure and shock waves) obtained in the last ten years. We have been able for the first time to state some basic features of such a neutron emission induced by cavitation, namely: 1) a marked threshold behavior in power, energy and time; 2) its occurring without a concomitant production of gamma radiation.Comment: 8 figures; we added some more important references; we replaced some figures with more detailed ones; we added more comprehensive details which could not be desclosed before as part of private patents which have been published no
    corecore