Nirupam Roy, Haitham Hassanieh, Romit Roy Choudhury
{"title":"BackDoor: Sounds that a microphone can record, but that humans can't hear","authors":"Nirupam Roy, Haitham Hassanieh, Romit Roy Choudhury","doi":"10.1145/3191789.3191799","DOIUrl":null,"url":null,"abstract":"Microphones are like human ears. If we play an audible sound, both humans and microphones will be able to hear it. We design sound that appears just as any other sound to microphones, but remains inaudible to humans. This sound can be regulated to carry data bits, thereby enabling an acoustic (but inaudible) communication channel to hundreds of smart devices that already have built-in microphones. Other applications include jamming spy microphones in the environment, live watermarking of music in a concert, and even threats like acoustic denial-of-service (DoS) attacks on phone calls or inaudible command attacks on voice-enabled devices.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"GetMobile Mob. Comput. Commun.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3191789.3191799","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
Microphones are like human ears. If we play an audible sound, both humans and microphones will be able to hear it. We design sound that appears just as any other sound to microphones, but remains inaudible to humans. This sound can be regulated to carry data bits, thereby enabling an acoustic (but inaudible) communication channel to hundreds of smart devices that already have built-in microphones. Other applications include jamming spy microphones in the environment, live watermarking of music in a concert, and even threats like acoustic denial-of-service (DoS) attacks on phone calls or inaudible command attacks on voice-enabled devices.