Javascript must be enabled to continue!
Data Exfiltration of Ultrasonic Signal in Computer Security System: A Review
View through CrossRef
It is crucial for public users and service providers to stay abreast of the progress and trends on data exfiltration in computer security system. In cryptosystem, it is unnoticeable for computer and mobile users to realize that inaudible sound used to transmit signals carrying pervasive sensitive data was in the low frequency ultrasonic range. Acoustic attacks on ultrasonic signal emanated by electronic devices have long been investigated among researchers. This paper is an exploration on the practicality of ultrasonic data exfiltration between computers in term of computer security system. It will discuss some work done by previous researchers in general, based on scientific, technological, and security perspectives. There will be inclusions of practical applications already in existence as well as future studies in related fields.
Institute of Advanced Engineering and Science
Title: Data Exfiltration of Ultrasonic Signal in Computer Security System: A Review
Description:
It is crucial for public users and service providers to stay abreast of the progress and trends on data exfiltration in computer security system.
In cryptosystem, it is unnoticeable for computer and mobile users to realize that inaudible sound used to transmit signals carrying pervasive sensitive data was in the low frequency ultrasonic range.
Acoustic attacks on ultrasonic signal emanated by electronic devices have long been investigated among researchers.
This paper is an exploration on the practicality of ultrasonic data exfiltration between computers in term of computer security system.
It will discuss some work done by previous researchers in general, based on scientific, technological, and security perspectives.
There will be inclusions of practical applications already in existence as well as future studies in related fields.
Related Results
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Development Tasks of AI-based Security Industry
Development Tasks of AI-based Security Industry
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's ...
Development of a Delphi Based Ultrasonic Testing Expert System
Development of a Delphi Based Ultrasonic Testing Expert System
A person who has the expertise to operate ultrasonic testing in the field of ultrasonic called experts. Currently very difficult to obtain an ultrasonic expert in an industry. For ...
Frequency analysis of ultrasonic wave propagation on metal pipe in ultrasonic tomography system
Frequency analysis of ultrasonic wave propagation on metal pipe in ultrasonic tomography system
Purpose
– Since the importance role of ultrasonic tomography (UT) in industry, especially in oil industry, to produce noninvasive and nondestructive plane images, r...
Personnel Security as an Integral Part of Economic Security at Agricultural Enterprises
Personnel Security as an Integral Part of Economic Security at Agricultural Enterprises
Abstract. Introduction. The article examines the place of personnel security as a component of the system of economic security at enterprises. The main approaches to the formation ...
Effects of Ultrasonic Waves During Waterflooding for Enhanced Oil Recovery
Effects of Ultrasonic Waves During Waterflooding for Enhanced Oil Recovery
Ultrasonic waves is an unconventional enhanced oil recovery (EOR) technology and has been a point of interest as it is more economical and environmentally friendly. Numerous resear...
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...
Human Security
Human Security
The term “human security” was first employed in the United Nations Development Programme (UNDP) Human Development Report (HDR) of 1994, which argued for a “people-centric” concept ...

