POSTER: A Tough Nut to Crack: Attempting to Break Modulation Obfuscation

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Despite being primarily developed for spectrum management, sharing, and enforcement in civilian and military applications, modulation classification can be exploited by an adversary to threaten user privacy (e.g., via traffic analysis), or launch jamming and spoofing attacks. Several existing works study how an adversary can still classify the user traffic despite obfuscation techniques at upper layers, but little work has been done on how an adversary can classify the "modulation scheme'' when it is obfuscated at the physical layer. In this respect, we aim to study how to break the state-of-the-art modulation obfuscation schemes by applying various machine learning (ML) methods. Our preliminary results show that common ML techniques perform poorly in correctly classifying an obfuscated modulation scheme except for the random forest method (with a score as much as twice the other techniques we consider), providing insights on why other techniques, e.g., deep learning, might be more promising for finding underlying correlations.

Cite

CITATION STYLE

APA

Hoque, N., & Rahbari, H. (2021). POSTER: A Tough Nut to Crack: Attempting to Break Modulation Obfuscation. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 2402–2404). Association for Computing Machinery. https://doi.org/10.1145/3460120.3485344

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free