Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure |
| |
Authors: | Xiao-Hang Wang Shou-Bin Li Ying-Tao Jiang Amit Kumar Singh Bi-Yun Ma Le-Tian Huang Mei Yang Fen Guo |
| |
Affiliation: | 1. School of Cyber Science and Technology, Zhejiang University, Hangzhou, 310012, China;2. ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, 310012, China;3. School of Software Engineering, South China University of Technology, Guangzhou, 510006, China;4. Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, 89154, USA;5. School of Computer Science and Electronic Engineering, University of Essex, Colchester, CO4 3SQ, UK;6. School of Electronics and Information Engineering, South China University of Technology, Guangzhou, 510640, China;7. School of Electronic Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 610054, China |
| |
Abstract: | When an inaudible sound covert channel (ISCC) attack is launched inside a computer system, sensitive data are converted to inaudible sound waves and then transmitted. The receiver at the other end picks up the sound signal, from which the original sensitive data can be recovered. As a forceful countermeasure against the ISCC attack, strong noise can be used to jam the channel and literally shut down any possible sound data transmission. In this paper, enhanced ISCC is proposed, whose transmission frequency can be dynamically changed. Essentially, if the transmitter detects that the covert channel is being jammed, the transmitter and receiver both will switch to another available frequency and re-establish their communications, following the proposed communications protocol. Experimental results show that the proposed enhanced ISCC can remain connected even in the presence of a strong jamming noise source. Correspondingly, a detection method based on frequency scanning is proposed to help to combat such an anti-jamming sound channel. With the proposed countermeasure, the bit error rate (BER) of the data communications over enhanced ISCC soars to more than 48%, essentially shutting down the data transmission, and thus neutralizing the security threat. |
| |
Keywords: | Countermeasure inaudible sound covert channel (ISCC) |
本文献已被 ScienceDirect 等数据库收录! |
| 点击此处可从《电子科技学刊:英文版》浏览原始摘要信息 |
|
点击此处可从《电子科技学刊:英文版》下载免费的PDF全文 |
|