DOLPHIN ATTACK GUOMING ZHANG, CHEN YAN PRESENTED BY JACOB BEDNARD - - PowerPoint PPT Presentation

dolphin attack
SMART_READER_LITE
LIVE PREVIEW

DOLPHIN ATTACK GUOMING ZHANG, CHEN YAN PRESENTED BY JACOB BEDNARD - - PowerPoint PPT Presentation

DOLPHIN ATTACK GUOMING ZHANG, CHEN YAN PRESENTED BY JACOB BEDNARD WAYNE STATE UNIVERSITY CSC6991 Overview Soundwaves and Digital Signal Processing (DSP) Attack Methodology Defense Mechanisms Demonstration Videos Soundwaves and


slide-1
SLIDE 1

DOLPHIN ATTACK

GUOMING ZHANG, CHEN YAN PRESENTED BY JACOB BEDNARD WAYNE STATE UNIVERSITY CSC6991

slide-2
SLIDE 2

Overview

  • Soundwaves and Digital Signal Processing (DSP)
  • Attack Methodology
  • Defense Mechanisms
  • Demonstration Videos
slide-3
SLIDE 3

Soundwaves and Digital Signal Processing (DSP)

slide-4
SLIDE 4

Analog Digital

slide-5
SLIDE 5
slide-6
SLIDE 6
slide-7
SLIDE 7
slide-8
SLIDE 8
slide-9
SLIDE 9
slide-10
SLIDE 10
slide-11
SLIDE 11
slide-12
SLIDE 12
slide-13
SLIDE 13

Attack Methodology

slide-14
SLIDE 14

Dolphin Attack Major Contributions

  • Attackers can use inaudible sounds (>20kHz) to activate and control

voice controllable systems such as cell phones, home entertainment systems, vehicles, etc.

  • The attack is sneaky in nature. Device owners may not be aware that

they are being attacked due to the remote distance and inaudible sounds that the attack utilizes.

slide-15
SLIDE 15

Dolphin Attack…?

What does this have to do with Dolphins?

slide-16
SLIDE 16

Motivation

  • Eaves Dropping (Leak Personal Data, Authentication By-Pass, etc.)
  • “Sneaky” Attack
  • Defeat the “Air-Gap”
  • Drive-By Attack
slide-17
SLIDE 17

Threat Model

  • No Target Device Access
  • No Owner Interaction
  • Inaudible
  • Attacking Equipment
slide-18
SLIDE 18

Feasibility Analysis (Test Setup)

slide-19
SLIDE 19

Feasibility Analysis (Exploiting Linear Amps)

slide-20
SLIDE 20

Feasibility Analysis (Speakers & Microphones)

slide-21
SLIDE 21

Attack Design

slide-22
SLIDE 22

Human Voice Samples

slide-23
SLIDE 23

Text-to-Speech Samples

slide-24
SLIDE 24

Command Modulation (Conversion to Inaudible)

slide-25
SLIDE 25

Low-Cost Attack Implementation

slide-26
SLIDE 26

Test Results

slide-27
SLIDE 27

Test Results

slide-28
SLIDE 28

Defense Mechanisms

slide-29
SLIDE 29

Hardware-Based Defenses

  • Microphone Enhancement
  • Inaudible Voice Command Cancellation
slide-30
SLIDE 30

Software-Based Defenses

  • Supported Vector Machines
  • (Machine learning)
  • 100% Success Rate w/ 24 voice samples
slide-31
SLIDE 31

Demonstration Videos

http://usslab.org/projects/dolphinAttack.html

slide-32
SLIDE 32

Summary

  • Soundwaves and Digital Signal Processing (DSP)
  • Attack Methodology
  • Defense Mechanisms
  • Demonstration Videos
slide-33
SLIDE 33

Questions / Comments?