Data exfiltration of ultrasonic signal in computer security system: A review

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

It is crucial for public users and service providers to stay abreast of the progress and trends on data exfiltration in computer security system. In cryptosystem, it is unnoticeable for computer and mobile users to realize that inaudible sound used to transmit signals carrying pervasive sensitive data was in the low frequency ultrasonic range. Acoustic attacks on ultrasonic signal emanated by electronic devices have long been investigated among researchers. This paper is an exploration on the practicality of ultrasonic data exfiltration between computers in term of computer security system. It will discuss some work done by previous researchers in general, based on scientific, technological, and security perspectives. There will be inclusions of practical applications already in existence as well as future studies in related fields.

Cite

CITATION STYLE

APA

Jabar, F. H. A., Mohammad, J. I., Zain, A. F. M., & Hasan, A. B. (2018). Data exfiltration of ultrasonic signal in computer security system: A review. Indonesian Journal of Electrical Engineering and Computer Science, 10(2), 490–497. https://doi.org/10.11591/ijeecs.v10.i2.pp490-497

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free