[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
column

BackDoor: Sounds that a microphone can record, but that humans can't hear

Published: 28 February 2018 Publication History

Abstract

Microphones are like human ears. If we play an audible sound, both humans and microphones will be able to hear it. We design sound that appears just as any other sound to microphones, but remains inaudible to humans. This sound can be regulated to carry data bits, thereby enabling an acoustic (but inaudible) communication channel to hundreds of smart devices that already have built-in microphones. Other applications include jamming spy microphones in the environment, live watermarking of music in a concert, and even threats like acoustic denial-of-service (DoS) attacks on phone calls or inaudible command attacks on voice-enabled devices.

References

[1]
Chirp technology. http://www.chirp.io.
[2]
Iannucci, P. A., Netravali, R., Goyal, A. K., and Balakrishnan, H. Room-area networks. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (2015), ACM, p. 9.
[3]
B. Zhang et al., "PriWhisper: Enabling keyless secure acoustic communication for smartphones," IEEE Internet of Things Journal, vol. 1, no. 1, Feb. 2014, pp. 33--45.
[4]
Nandakumar, R., Chintalapudi, K. K., Padmanabhan, V., and Venkatesan, R. Dhwani: secure peer-to-peer acoustic nfc. In ACM SIGCOMM Computer Communication Review (2013), vol. 43, pp. 63--74.
[5]
Cmu sphinx. http://cmusphinx.sourceforge.net.
[6]
Perez, J. P. A., Pueyo, S. C., and Lopez, B. C.Agc fundamentals. In Automatic Gain Control. (Springer, 2011), pp. 13--28.
[7]
Shannon, C.E. "Communication in the presence of noise." Proceedings of the IRE. 1949 Jan.; 37(1):10--21.

Cited By

View all
  • (2024)Wavoice: An mmWave-Assisted Noise-Resistant Speech Recognition SystemACM Transactions on Sensor Networks10.1145/359745720:4(1-29)Online publication date: 11-May-2024
  • (2024)Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research DirectionsIEEE Access10.1109/ACCESS.2024.335581612(29004-29023)Online publication date: 2024
  • (2023)Authentication methods for voice services on smart speakers – a multi-method study on perceived security and ease of usei-com10.1515/icom-2022-003922:1(67-81)Online publication date: 29-Mar-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image GetMobile: Mobile Computing and Communications
GetMobile: Mobile Computing and Communications  Volume 21, Issue 4
December 2017
30 pages
ISSN:2375-0529
EISSN:2375-0537
DOI:10.1145/3191789
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 February 2018
Published in SIGMOBILE-GETMOBILE Volume 21, Issue 4

Check for updates

Qualifiers

  • Column

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)1
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Wavoice: An mmWave-Assisted Noise-Resistant Speech Recognition SystemACM Transactions on Sensor Networks10.1145/359745720:4(1-29)Online publication date: 11-May-2024
  • (2024)Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research DirectionsIEEE Access10.1109/ACCESS.2024.335581612(29004-29023)Online publication date: 2024
  • (2023)Authentication methods for voice services on smart speakers – a multi-method study on perceived security and ease of usei-com10.1515/icom-2022-003922:1(67-81)Online publication date: 29-Mar-2023
  • (2023)ThermWareProceedings of the 24th International Workshop on Mobile Computing Systems and Applications10.1145/3572864.3580339(81-88)Online publication date: 22-Feb-2023
  • (2022)Alexa, It’s Me! An Online Survey on the User Experience of Smart Speaker AuthenticationProceedings of Mensch und Computer 202210.1145/3543758.3543765(14-24)Online publication date: 4-Sep-2022
  • (2022)SPiDRProceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services10.1145/3498361.3539775(99-113)Online publication date: 27-Jun-2022
  • (2021)PowerCut and obfuscatorProceedings of the Seventeenth USENIX Conference on Usable Privacy and Security10.5555/3563572.3563600(535-551)Online publication date: 9-Aug-2021
  • (2021)WavoiceProceedings of the 19th ACM Conference on Embedded Networked Sensor Systems10.1145/3485730.3485945(97-110)Online publication date: 15-Nov-2021
  • (2020)Listen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy ControlsProceedings on Privacy Enhancing Technologies10.2478/popets-2020-00262020:2(251-270)Online publication date: 8-May-2020
  • (2020)Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy RisksProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376529(1-13)Online publication date: 21-Apr-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media