The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

[HTML][HTML] Cyber-security threats and side-channel attacks for digital agriculture

AN Alahmadi, SU Rehman, HS Alhazmi, DG Glynn… - Sensors, 2022 - mdpi.com
The invention of smart low-power devices and ubiquitous Internet connectivity have
facilitated the shift of many labour-intensive jobs into the digital domain. The shortage of …

A practical deep learning-based acoustic side channel attack on keyboards

J Harrison, E Toreini… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
With recent developments in deep learning, the ubiquity of microphones and the rise in
online services via personal devices, acoustic side channel attacks present a greater threat …

[PDF][PDF] Eavesdrop** on controller acoustic emanation for keystroke inference attack in virtual reality

S Luo, A Nguyen, H Farooq, K Sun… - The Network and …, 2024 - ndss-symposium.org
Understanding the vulnerability of virtual reality (VR) is crucial for protecting sensitive data
and building user trust in VR ecosystems. Previous attacks have demonstrated the feasibility …

Muteit: Jaw motion based unvoiced command recognition using earable

T Srivastava, P Khanna, S Pan, P Nguyen… - Proceedings of the ACM …, 2022 - dl.acm.org
In this paper, we present MuteIt, an ear-worn system for recognizing unvoiced human
commands. MuteIt presents an intuitive alternative to voice-based interactions that can be …

[PDF][PDF] Ghosttype: The limits of using contactless electromagnetic interference to inject phantom keys into analog circuits of keyboards

Q Jiang, Y Ren, Y Long, C Yan, Y Sun… - Network and …, 2024 - researchgate.net
Keyboards are the primary peripheral input devices for various critical computer application
scenarios. This paper performs a security analysis of the keyboard sensing mechanisms and …

Synesthesia: Detecting screen content via remote acoustic side channels

D Genkin, M Pattani, R Schuster… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
We show that subtle acoustic noises emanating from within computer screens can be used
to detect the content displayed on the screens. This sound can be picked up by ordinary …

WINK: Wireless inference of numerical keystrokes via zero-training spatiotemporal analysis

E Yang, Q He, S Fang - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Sensitive numbers play an unparalleled role in identification and authentication. Recent
research has revealed plenty of side-channel attacks to infer keystrokes, which require …

Whispering devices: A survey on how side-channels lead to compromised information

C Lavaud, R Gerzaguet, M Gautier, O Berder… - Journal of Hardware and …, 2021 - Springer
While operating, information processing devices or communication systems may emit
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …

Sok: Keylogging side channels

JV Monaco - 2018 IEEE Symposium on Security and Privacy …, 2018 - ieeexplore.ieee.org
The first keylogging side channel attack was discovered over 50 years ago when Bell
Laboratory researchers noticed an electromagnetic spike emanating from a Bell 131-B2 …