Capspeaker: Injecting voices to microphones via capacitors

X Ji, J Zhang, S Jiang, J Li, W Xu - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Voice assistants can be manipulated by various malicious voice commands, yet existing
attacks require a nearby speaker to play the attack commands. In this paper, we show that …

Tempest comeback: A realistic audio eavesdropping threat on mixed-signal socs

J Choi, HY Yang, DH Cho - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
This study presents a new TEMPEST threat that an attacker can surreptitiously obtain
original plain audio information from a distance by exploiting recently emerging …

POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers

M Guri - IEEE Transactions on Dependable and Secure …, 2021 - ieeexplore.ieee.org
In this article, we introduce a new covert channel that enables attackers to leak data
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …

Air-gap electromagnetic covert channel

M Guri - IEEE Transactions on Dependable and Secure …, 2023 - ieeexplore.ieee.org
Air-gapped systems are isolated from the Internet due to the sensitive information they
handle. This paper introduces a covert channel attack that leaks sensitive information over …

Remote attacks on speech recognition systems using sound from power supply

L Yang, X Chen, X Jian, L Yang, Y Li, Q Ren… - 32nd USENIX Security …, 2023 - usenix.org
Speech recognition (SR) systems are used on smart phones and speakers to make
inquiries, compose emails, and initiate phone calls. However, they also impose a serious …

SATAn: Air-gap exfiltration attack via radio signals from SATA cables

M Guri - 2022 19th Annual International Conference on Privacy …, 2022 - ieeexplore.ieee.org
This paper introduces a new type of attack on isolated, air-gapped workstations. Although air-
gap computers have no wireless connectivity, we show that attackers can use the SATA …

CapSpeaker: Injecting Commands to Voice Assistants via Capacitors

Y Jiang, X Ji, J Zhang, Y Jiang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recent studies have exposed that voice assistants can be manipulated by various voice
commands without being noticed, however, existing attacks require a nearby speaker to play …

Tagnoo: Enabling Smart Room-Scale Environments with RFID-Augmented Plywood

Y Su, T Zhang, J Feng, Y Shi, XD Yang… - Proceedings of the CHI …, 2024 - dl.acm.org
Tagnoo is a computational plywood augmented with RFID tags, aimed at empowering
woodworkers to effortlessly create room-scale smart environments. Unlike existing solutions …

Noise-sdr: Arbitrary modulation of electromagnetic noise from unprivileged software and its impact on emission security

G Camurati, A Francillon - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
Electronic devices generate electromagnetic noise, also known as EM leakage when the
noise leaks information. Many recent research papers exploit the fact that software activity …

COVID-bit: Keep a Distance of (at least) 2m From My Air-Gap Computer!

M Guri - arXiv preprint arXiv:2212.03520, 2022 - arxiv.org
Air-gapped systems are isolated from the Internet due to the sensitive information they
handle. This paper presents COVID-bit, a new COVert channel attack that leaks sensitive …