2019
DOI: 10.1109/access.2019.2918261
|View full text |Cite
|
Sign up to set email alerts
|

JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds

Abstract: With the development of digital devices, the recording process has become increasingly easier to conduct. However, the portability of the recording devices has also made recording difficult to monitor. If private conversations are illegally recorded, it will cause serious secret-leakage events. Therefore, it is imperative to prevent unauthorized recordings. Recent works have demonstrated that the nonlinearity effect of microphones can be leveraged to interfere with microphone recording using ultrasounds. Howev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…In other words, the same source of vulnerability which can be used to destabilize [10] and control [13], [34], [43] gyroscopes and accelerometers can be used for covert channel communication [171], [172], tracking [173], and speaker identification [174], [175]. Similarly, instead of using microphone non-linearities for command injections [11], [55], [134], Shen et al [177] and Chen et al [178] leveraged them to protect users' privacy by jamming nearby recording devices.…”
Section: Additional Related Workmentioning
confidence: 99%
“…In other words, the same source of vulnerability which can be used to destabilize [10] and control [13], [34], [43] gyroscopes and accelerometers can be used for covert channel communication [171], [172], tracking [173], and speaker identification [174], [175]. Similarly, instead of using microphone non-linearities for command injections [11], [55], [134], Shen et al [177] and Chen et al [178] leveraged them to protect users' privacy by jamming nearby recording devices.…”
Section: Additional Related Workmentioning
confidence: 99%
“…In [27], [90], [91], [97], [101], [138], [139], [146], the authors exploit the non-linearity vulnerability of the microphones in IVC devices. In particular, the adversary can craft malicious voice commands at inaudible frequency by exploiting non-linearity in the demodulation of current microphone technology.…”
Section: B Targeting Sensor Processing Modulementioning
confidence: 99%
“…Specifically, they find that many popular speech recognition systems utilize MFCC to extract acoustic features for analysis and decoding. Therefore, they propose to mangle a malicious voice command signal, so that it can preserve [27], [53], [90], [91], [97], [101], [104], [138], [139], [142], [146] Sensor enough MFCC acoustic features for the target speech recognition systems to recognize their desired command, but remain difficult for human being to interpret. They demonstrate their attacks against both white box (CMU Sphinx) and black box (Google Now) speech recognition systems, and the human perception study shows the adversarial audio is almost uninterpretable to human being.…”
Section: Targeting Signal Pre-processing Modulementioning
confidence: 99%