19,983 research outputs found
Short-range ultrasonic communications in air using quadrature modulation
A study has been undertaken of ultrasonic communications methods in air, using a quadrature modulation method. Simulations were first performed to establish the likely performance of quadrature phase shift keying over the limited bandwidth available in an ultrasonic system. Quadrature phase shift keying modulation was then implemented within an experimental communication system, using capacitive ultrasonic sources and receivers. The results show that such a system is feasible in principle for communications over distances of several meters, using frequencies in the 200 to 400 kHz range
DolphinAtack: Inaudible Voice Commands
Speech recognition (SR) systems such as Siri or Google Now have become an
increasingly popular human-computer interaction method, and have turned various
systems into voice controllable systems(VCS). Prior work on attacking VCS shows
that the hidden voice commands that are incomprehensible to people can control
the systems. Hidden voice commands, though hidden, are nonetheless audible. In
this work, we design a completely inaudible attack, DolphinAttack, that
modulates voice commands on ultrasonic carriers (e.g., f > 20 kHz) to achieve
inaudibility. By leveraging the nonlinearity of the microphone circuits, the
modulated low frequency audio commands can be successfully demodulated,
recovered, and more importantly interpreted by the speech recognition systems.
We validate DolphinAttack on popular speech recognition systems, including
Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa. By
injecting a sequence of inaudible voice commands, we show a few
proof-of-concept attacks, which include activating Siri to initiate a FaceTime
call on iPhone, activating Google Now to switch the phone to the airplane mode,
and even manipulating the navigation system in an Audi automobile. We propose
hardware and software defense solutions. We validate that it is feasible to
detect DolphinAttack by classifying the audios using supported vector machine
(SVM), and suggest to re-design voice controllable systems to be resilient to
inaudible voice command attacks.Comment: 15 pages, 17 figure
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers
It is known that attackers can exfiltrate data from air-gapped computers
through their speakers via sonic and ultrasonic waves. To eliminate the threat
of such acoustic covert channels in sensitive systems, audio hardware can be
disabled and the use of loudspeakers can be strictly forbidden. Such audio-less
systems are considered to be \textit{audio-gapped}, and hence immune to
acoustic covert channels.
In this paper, we introduce a technique that enable attackers leak data
acoustically from air-gapped and audio-gapped systems. Our developed malware
can exploit the computer power supply unit (PSU) to play sounds and use it as
an out-of-band, secondary speaker with limited capabilities. The malicious code
manipulates the internal \textit{switching frequency} of the power supply and
hence controls the sound waveforms generated from its capacitors and
transformers. Our technique enables producing audio tones in a frequency band
of 0-24khz and playing audio streams (e.g., WAV) from a computer power supply
without the need for audio hardware or speakers. Binary data (files,
keylogging, encryption keys, etc.) can be modulated over the acoustic signals
and sent to a nearby receiver (e.g., smartphone). We show that our technique
works with various types of systems: PC workstations and servers, as well as
embedded systems and IoT devices that have no audio hardware at all. We provide
technical background and discuss implementation details such as signal
generation and data modulation. We show that the POWER-SUPPLaY code can operate
from an ordinary user-mode process and doesn't need any hardware access or
special privileges. Our evaluation shows that using POWER-SUPPLaY, sensitive
data can be exfiltrated from air-gapped and audio-gapped systems from a
distance of five meters away at a maximal bit rates of 50 bit/sec
Neutrons from Piezonuclear Reactions
We report the results obtained by cavitating water solutions of iron salts
(iron chloride and iron nitrate) with different concentrations at different
ultrasound powers. In all cases we detected a neutron radiation well higher
than the background level. The neutron production is perfectly reproducible and
can at some extent be controlled. These evidences for neutron emission
generated by cavitation support some preliminary clues for the possibility of
piezonuclear reactions (namely nuclear reactions induced by pressure and shock
waves) obtained in the last ten years. We have been able for the first time to
state some basic features of such a neutron emission induced by cavitation,
namely: 1) a marked threshold behavior in power, energy and time; 2) its
occurring without a concomitant production of gamma radiation.Comment: 8 figures; we added some more important references; we replaced some
figures with more detailed ones; we added more comprehensive details which
could not be desclosed before as part of private patents which have been
published no
- …