Inaudible sound covert channel with anti-jamming capability: Attacks vs. countermeasure

When an inaudible sound covert channel (ISCC) attack is launched inside a computer system, sensitive data are converted to inaudible sound waves and then transmitted. The receiver at the other end picks up the sound signal, from which the original sensitive data can be recovered. As a forceful count...

Full description

Bibliographic Details
Main Authors: Xiao-Hang Wang, Shou-Bin Li, Ying-Tao Jiang, Amit Kumar Singh, Bi-Yun Ma, Le-Tian Huang, Mei Yang, Fen Guo
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2022-12-01
Series:Journal of Electronic Science and Technology
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1674862X22000349