dolphin attack
play

DOLPHIN ATTACK GUOMING ZHANG, CHEN YAN PRESENTED BY JACOB BEDNARD - PowerPoint PPT Presentation

DOLPHIN ATTACK GUOMING ZHANG, CHEN YAN PRESENTED BY JACOB BEDNARD WAYNE STATE UNIVERSITY CSC6991 Overview Soundwaves and Digital Signal Processing (DSP) Attack Methodology Defense Mechanisms Demonstration Videos Soundwaves and


  1. DOLPHIN ATTACK GUOMING ZHANG, CHEN YAN PRESENTED BY JACOB BEDNARD WAYNE STATE UNIVERSITY CSC6991

  2. Overview • Soundwaves and Digital Signal Processing (DSP) • Attack Methodology • Defense Mechanisms • Demonstration Videos

  3. Soundwaves and Digital Signal Processing (DSP)

  4. Analog Digital

  5. Attack Methodology

  6. Dolphin Attack Major Contributions • Attackers can use inaudible sounds (>20kHz) to activate and control voice controllable systems such as cell phones, home entertainment systems, vehicles, etc. • The attack is sneaky in nature. Device owners may not be aware that they are being attacked due to the remote distance and inaudible sounds that the attack utilizes.

  7. Dolphin Attack…? What does this have to do with Dolphins?

  8. Motivation • Eaves Dropping (Leak Personal Data, Authentication By-Pass, etc.) • “Sneaky” Attack • Defeat the “Air-Gap” • Drive-By Attack

  9. Threat Model • No Target Device Access • No Owner Interaction • Inaudible • Attacking Equipment

  10. Feasibility Analysis (Test Setup)

  11. Feasibility Analysis (Exploiting Linear Amps)

  12. Feasibility Analysis (Speakers & Microphones)

  13. Attack Design

  14. Human Voice Samples

  15. Text-to-Speech Samples

  16. Command Modulation ( Conversion to Inaudible)

  17. Low-Cost Attack Implementation

  18. Test Results

  19. Test Results

  20. Defense Mechanisms

  21. Hardware-Based Defenses • Microphone Enhancement • Inaudible Voice Command Cancellation

  22. Software-Based Defenses • Supported Vector Machines • (Machine learning) • 100% Success Rate w/ 24 voice samples

  23. Demonstration Videos http://usslab.org/projects/dolphinAttack.html

  24. Summary • Soundwaves and Digital Signal Processing (DSP) • Attack Methodology • Defense Mechanisms • Demonstration Videos

  25. Questions / Comments?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend