Inaudible sound covert channel with anti-jamming capability: Attacks vs. countermeasure
When an inaudible sound covert channel (ISCC) attack is launched inside a computer system, sensitive data are converted to inaudible sound waves and then transmitted. The receiver at the other end picks up the sound signal, from which the original sensitive data can be recovered. As a forceful count...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co., Ltd.
2022-12-01
|
Series: | Journal of Electronic Science and Technology |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S1674862X22000349 |