[go: up one dir, main page]

Dhatchaya, 2025 - Google Patents

Covert Data Exfiltration from Smartphones through mmWave FMCW Radar

Dhatchaya, 2025

View PDF
Document ID
3692693373822272628
Author
Dhatchaya P
Publication year

External Links

Snippet

This research explores a novel covert communication method using smartphonegenerated vibrations detected by millimeter-wave (mmWave) Frequency-Modulated Continuous Wave (FMCW) radar. Traditional covert channels rely on internet connectivity, sound, or proximity …
Continue reading at dl.ucsc.cmb.ac.lk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2602Signal structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication

Similar Documents

Publication Publication Date Title
US11264047B2 (en) Causing a voice enabled device to defend against inaudible signal attacks
Nandakumar et al. Dhwani: secure peer-to-peer acoustic NFC
Yan et al. The feasibility of injecting inaudible voice commands to voice assistants
EP2188922B1 (en) Ultrasound detectors
Wei et al. Acoustic eavesdropping through wireless vibrometry
Wang et al. Ghosttalk: Interactive attack on smartphone voice system through power line
Wang et al. Thru-the-wall eavesdropping on loudspeakers via RFID by capturing sub-mm level vibration
Carrara et al. Out-of-band covert channels—A survey
US20170179986A1 (en) Communicating through physical vibration
Novak et al. Ultrasound proximity networking on smart mobile devices for IoT applications
Block et al. An autonomic and permissionless android covert channel
Mao et al. An inaudible voice attack to context-based device authentication in smart IoT systems
Yi et al. Wearlock: Unlocking your phone via acoustics using smartwatch
Matyunin et al. Zero-permission acoustic cross-device tracking
Matyunin et al. Vibrational covert channels using low-frequency acoustic signals
Chung Short distance data transmission method using inaudible high-frequencies between smart devices
Carrara Air-gap covert channels
Truong et al. DoubleEcho: Mitigating context-manipulation attacks in copresence verification
Guri et al. Lcd tempest air-gap attack reloaded
Dhatchaya Covert Data Exfiltration from Smartphones through mmWave FMCW Radar
KR20250109729A (en) Communication methods and systems for electronic devices
Li et al. The power of whispering: Near field assertions via acoustic communications
Arp et al. Bat in the mobile: a study on ultrasonic device tracking
Abrar et al. Quantifying interference-assisted signal strength surveillance of sound vibrations
Trip et al. Analysis of the compromising audio signal from the emission security perspective