2017
DOI: 10.1007/978-3-319-62024-4_14
|View full text |Cite
|
Sign up to set email alerts
|

Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…However, the contributions [81] and [4] confuted experimentally the idea that MITM attacks on the audio channel can be always detected because of the human perception of the communication channel.Hence, in [81], the authors demonstrated that systems based on self-jamming cannot fully reliably detect the presence of signals injected by a malicious adversary that is co-located with the victim, i.e., they are not able to face the so-called overshadowing attack. It is worth noting that facing the overshadowing attacks is more challenging than dealing with co-located MITM attacks described in Section III in the context of TFA techniques.…”
Section: B Literature Reviewmentioning
confidence: 99%
“…However, the contributions [81] and [4] confuted experimentally the idea that MITM attacks on the audio channel can be always detected because of the human perception of the communication channel.Hence, in [81], the authors demonstrated that systems based on self-jamming cannot fully reliably detect the presence of signals injected by a malicious adversary that is co-located with the victim, i.e., they are not able to face the so-called overshadowing attack. It is worth noting that facing the overshadowing attacks is more challenging than dealing with co-located MITM attacks described in Section III in the context of TFA techniques.…”
Section: B Literature Reviewmentioning
confidence: 99%