Dhatchaya, 2025 - Google Patents
Covert Data Exfiltration from Smartphones through mmWave FMCW RadarDhatchaya, 2025
View PDF- Document ID
- 3692693373822272628
- Author
- Dhatchaya P
- Publication year
External Links
Snippet
This research explores a novel covert communication method using smartphonegenerated vibrations detected by millimeter-wave (mmWave) Frequency-Modulated Continuous Wave (FMCW) radar. Traditional covert channels rely on internet connectivity, sound, or proximity …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/26—Systems using multi-frequency codes
- H04L27/2601—Multicarrier modulation systems
- H04L27/2602—Signal structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11264047B2 (en) | Causing a voice enabled device to defend against inaudible signal attacks | |
Nandakumar et al. | Dhwani: secure peer-to-peer acoustic NFC | |
Yan et al. | The feasibility of injecting inaudible voice commands to voice assistants | |
EP2188922B1 (en) | Ultrasound detectors | |
Wei et al. | Acoustic eavesdropping through wireless vibrometry | |
Wang et al. | Ghosttalk: Interactive attack on smartphone voice system through power line | |
Wang et al. | Thru-the-wall eavesdropping on loudspeakers via RFID by capturing sub-mm level vibration | |
Carrara et al. | Out-of-band covert channels—A survey | |
US20170179986A1 (en) | Communicating through physical vibration | |
Novak et al. | Ultrasound proximity networking on smart mobile devices for IoT applications | |
Block et al. | An autonomic and permissionless android covert channel | |
Mao et al. | An inaudible voice attack to context-based device authentication in smart IoT systems | |
Yi et al. | Wearlock: Unlocking your phone via acoustics using smartwatch | |
Matyunin et al. | Zero-permission acoustic cross-device tracking | |
Matyunin et al. | Vibrational covert channels using low-frequency acoustic signals | |
Chung | Short distance data transmission method using inaudible high-frequencies between smart devices | |
Carrara | Air-gap covert channels | |
Truong et al. | DoubleEcho: Mitigating context-manipulation attacks in copresence verification | |
Guri et al. | Lcd tempest air-gap attack reloaded | |
Dhatchaya | Covert Data Exfiltration from Smartphones through mmWave FMCW Radar | |
KR20250109729A (en) | Communication methods and systems for electronic devices | |
Li et al. | The power of whispering: Near field assertions via acoustic communications | |
Arp et al. | Bat in the mobile: a study on ultrasonic device tracking | |
Abrar et al. | Quantifying interference-assisted signal strength surveillance of sound vibrations | |
Trip et al. | Analysis of the compromising audio signal from the emission security perspective |