Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure

被引:0
作者
Xiao-Hang Wang [1 ,2 ]
Shou-Bin Li [3 ]
Ying-Tao Jiang [4 ]
Amit Kumar Singh [5 ]
Bi-Yun Ma [6 ]
Le-Tian Huang [7 ]
Mei Yang [4 ]
Fen Guo [3 ]
机构
[1] the School of Cyber Science and Technology, Zhejiang University
[2] ZJU-Hangzhou Global Scientific and Technological Innovation Center
[3] the School of Software Engineering, South China University of Technology
[4] the Department of Electrical and Computer Engineering, University of Nevada
[5] the School of Computer Science and Electronic Engineering, University of Essex
[6] the School of Electronics and Information Engineering, South China University of Technology
[7] the School of Electronic Science and Engineering, University of Electronic Science and Technology of China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TN918 [通信保密与通信安全];
学科分类号
0839 ; 1402 ;
摘要
When an inaudible sound covert channel(ISCC) attack is launched inside a computer system, sensitive data are converted to inaudible sound waves and then transmitted. The receiver at the other end picks up the sound signal, from which the original sensitive data can be recovered. As a forceful countermeasure against the ISCC attack, strong noise can be used to jam the channel and literally shut down any possible sound data transmission. In this paper, enhanced ISCC is proposed, whose transmission frequency can be dynamically changed. Essentially, if the transmitter detects that the covert channel is being jammed, the transmitter and receiver both will switch to another available frequency and re-establish their communications, following the proposed communications protocol.Experimental results show that the proposed enhanced ISCC can remain connected even in the presence of a strong jamming noise source. Correspondingly, a detection method based on frequency scanning is proposed to help to combat such an anti-jamming sound channel. With the proposed countermeasure, the bit error rate(BER) of the data communications over enhanced ISCC soars to more than 48%, essentially shutting down the data transmission, and thus neutralizing the security threat.
引用
收藏
页码:396 / 415
页数:20
相关论文
共 10 条
[1]  
Mordechai Guri,Yosef Solewicz,Yuval Elovici.Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise[J].Computers & Security,2020
[2]  
S. Soderi.Acoustic-Based Security: A Key Enabling Technology for Wireless Sensor Networks[J].International Journal of Wireless Information Networks,2020
[3]  
Jorge E. Coyac-Torres,Mario E. Rivero-Angeles,Eleazar Aguirre-Anaya.Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments[J].Mobile Networks and Applications,2020
[4]  
Mordechai Guri,Yosef Solewicz,Yuval Elovici.Speaker-to-speaker covert ultrasonic communication[J].Journal of Information Security and Applications,2020
[5]  
Matthias Naumann,Steffen Wendzel,Wojciech Mazurczyk,Joerg Keller.Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions[J].Security and Communication Networks,2016
[6]  
Benjamin A. Braun,Suman Jana,Dan Boneh.Robust and Efficient Elimination of Cache and Timing Side Channels[J].CoRR,2015
[7]  
Michael Hanspach,Michael Goetz.On Covert Acoustical Mesh Networks in Air[J].Journal of communications,2013
[8]  
Geert Leus,Paul A. van Walree.Multiband OFDM for Covert Acoustic Communications[J].IEEE Journal on Selected Areas in Communications,2008
[9]  
Jaejoong Kwon,Sungchul Kim,Sookyoung Roh,Byoungho Lee.Tunable dispersion slope compensator using a chirped fiber Bragg grating tuned by a fan-shaped thin metallic heat channel[J].IEEE Photonics Technology Letters,2006
[10]  
Yanfang Yang,Zhuangqi Cao,Qishun Shen,Jumin Hao,Ling Qiu,Yuquan Shen,Wen Yuan,Pingping Xiao.Multi-channel light modulation based on the attenuation total reflection[J].Optics and Laser Technology,2004