Asyaev Grigorii Dmitrievich, Antyasov Ivan Sergeevich
{"title":"利用耳机实现了语音信息泄露的技术通道","authors":"Asyaev Grigorii Dmitrievich, Antyasov Ivan Sergeevich","doi":"10.1109/USBEREIT.2018.8384591","DOIUrl":null,"url":null,"abstract":"The work considers a vulnerability that allows you to record information circulating in the room through the headphones. The function «jack retasking» is described both from the program and from the technical point of view. The main scenarios for the implementation of this vulnerability are considered and methods of counteraction are singled out.","PeriodicalId":176222,"journal":{"name":"2018 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Using headphones to implement a technical channel for the leakage of voice information\",\"authors\":\"Asyaev Grigorii Dmitrievich, Antyasov Ivan Sergeevich\",\"doi\":\"10.1109/USBEREIT.2018.8384591\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The work considers a vulnerability that allows you to record information circulating in the room through the headphones. The function «jack retasking» is described both from the program and from the technical point of view. The main scenarios for the implementation of this vulnerability are considered and methods of counteraction are singled out.\",\"PeriodicalId\":176222,\"journal\":{\"name\":\"2018 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/USBEREIT.2018.8384591\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/USBEREIT.2018.8384591","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using headphones to implement a technical channel for the leakage of voice information
The work considers a vulnerability that allows you to record information circulating in the room through the headphones. The function «jack retasking» is described both from the program and from the technical point of view. The main scenarios for the implementation of this vulnerability are considered and methods of counteraction are singled out.