[HTML][HTML] UltraJam: Ultrasonic adaptive jammer based on nonlinearity effect of microphone circuits
Z Han, J Ma, C Xu, G Zhang - High-Confidence Computing, 2023 - Elsevier
The widely used devices (eg smartphones, recorders) equipped with microphones have
posed a severe threat to confidential conversations. In this paper, we design an inaudible …
posed a severe threat to confidential conversations. In this paper, we design an inaudible …
NUANCE: Near Ultrasound Attack On Networked Communication Environments
[PDF][PDF] NEAR ULTRASONIC ATTACK AND DEFENSIVE COUNTERMEASURES
FMKD Noever - researchgate.net
The practical implications of issuing inaudible voice commands. The research mapped each
attack vector to a tactic or technique from the MITRE ATT&CK matrix, covering enterprise …
attack vector to a tactic or technique from the MITRE ATT&CK matrix, covering enterprise …