咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Inaudible Sound Covert Channel... 收藏

Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure

作     者:Xiao-Hang Wang Shou-Bin Li Ying-Tao Jiang Amit Kumar Singh Bi-Yun Ma Le-Tian Huang Mei Yang Fen Guo Xiao-Hang Wang;Shou-Bin Li;Ying-Tao Jiang;Amit Kumar Singh;Bi-Yun Ma;Le-Tian Huang;Mei Yang;Fen Guo

作者机构:School of Cyber Science and TechnologyZhejiang UniversityHangzhou 310012 ZJU-Hangzhou Global Scientific and Technological Innovation CenterHangzhou 310012 School of Software EngineeringSouth China University of TechnologyGuangzhou 510006 Department of Electrical and Computer EngineeringUniversity of NevadaLas Vegas 89154 School of Computer Science and Electronic EngineeringUniversity of EssexColchester CO43SQ School of Electronics and Information EngineeringSouth China University of TechnologyGuangzhou 510640 School of Electronic Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengdu 610054 

出 版 物:《Journal of Electronic Science and Technology》 (电子科技学刊(英文版))

年 卷 期:2022年第20卷第4期

页      面:396-415页

核心收录:

学科分类:11[军事学] 1105[军事学-军队指挥学] 0839[工学-网络空间安全] 08[工学] 110505[军事学-密码学] 110503[军事学-军事通信学] 

基  金:This work was supported partly by the National Natural Science Foundation of China under Grant No.61971200 partly by Zhejiang Lab under Grants No.2021LE0AB01 and No.2021PC0AC01 partly by the Major Scientific Research Project of Zhejiang Lab under Grant No.2021LE0AC01 partly by the Key Technologies R&D Program of Jiangsu(Prospective and Key Technologies for Industry)under Grant No.BE2021003 partly by the National Key Research and Development Program of China under Grant No.2019QY0705 by the Guangdong Provincial Key Laboratory of Short-Range Wireless Detection and Communication under Grants No.2014B030301010 and No.2017B030314003 

主  题:Countermeasure inaudible sound covert channel(ISCC) 

摘      要:When an inaudible sound covert channel(ISCC)attack is launched inside a computer system,sensitive data are converted to inaudible sound waves and then *** receiver at the other end picks up the sound signal,from which the original sensitive data can be *** a forceful countermeasure against the ISCC attack,strong noise can be used to jam the channel and literally shut down any possible sound data *** this paper,enhanced ISCC is proposed,whose transmission frequency can be dynamically ***,if the transmitter detects that the covert channel is being jammed,the transmitter and receiver both will switch to another available frequency and re-establish their communications,following the proposed communications *** results show that the proposed enhanced ISCC can remain connected even in the presence of a strong jamming noise ***,a detection method based on frequency scanning is proposed to help to combat such an anti-jamming sound *** the proposed countermeasure,the bit error rate(BER)of the data communications over enhanced ISCC soars to more than 48%,essentially shutting down the data transmission,and thus neutralizing the security threat.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分