首页 | 本学科首页   官方微博 | 高级检索  
     


Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure
Authors:Xiao-Hang Wang  Shou-Bin Li  Ying-Tao Jiang  Amit Kumar Singh  Bi-Yun Ma  Le-Tian Huang  Mei Yang  Fen Guo
Affiliation:1. School of Cyber Science and Technology, Zhejiang University, Hangzhou, 310012, China;2. ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, 310012, China;3. School of Software Engineering, South China University of Technology, Guangzhou, 510006, China;4. Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, 89154, USA;5. School of Computer Science and Electronic Engineering, University of Essex, Colchester, CO4 3SQ, UK;6. School of Electronics and Information Engineering, South China University of Technology, Guangzhou, 510640, China;7. School of Electronic Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 610054, China
Abstract:When an inaudible sound covert channel (ISCC) attack is launched inside a computer system, sensitive data are converted to inaudible sound waves and then transmitted. The receiver at the other end picks up the sound signal, from which the original sensitive data can be recovered. As a forceful countermeasure against the ISCC attack, strong noise can be used to jam the channel and literally shut down any possible sound data transmission. In this paper, enhanced ISCC is proposed, whose transmission frequency can be dynamically changed. Essentially, if the transmitter detects that the covert channel is being jammed, the transmitter and receiver both will switch to another available frequency and re-establish their communications, following the proposed communications protocol. Experimental results show that the proposed enhanced ISCC can remain connected even in the presence of a strong jamming noise source. Correspondingly, a detection method based on frequency scanning is proposed to help to combat such an anti-jamming sound channel. With the proposed countermeasure, the bit error rate (BER) of the data communications over enhanced ISCC soars to more than 48%, essentially shutting down the data transmission, and thus neutralizing the security threat.
Keywords:Countermeasure   inaudible sound covert channel (ISCC)
本文献已被 ScienceDirect 等数据库收录!
点击此处可从《电子科技学刊:英文版》浏览原始摘要信息
点击此处可从《电子科技学刊:英文版》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号