Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterNovember 2022
Poster: Inaudible Acoustic Noise from Silicon Capacitors for Voice-Command Injection
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 3339–3341https://doi.org/10.1145/3548606.3563526Multi-layer ceramic capacitors (MLCCs), commonly used in electronics products, can generate acoustic noise driven by electrical deviation. Such acoustic noise has been exploited to attack systems' security. In particular, CapSpeaker silently delivers ...
- demonstrationNovember 2022
Demo: End-to-End Wireless Disruption of CCS EV Charging
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 3515–3517https://doi.org/10.1145/3548606.3563489The shift from vehicles with internal combustion engines (ICE) to fully Electric Vehicles (EVs) is happening at a rapid pace. To be competitive with ICEs and ensure a smooth rollout, the charging process of EVs needs to be as fast and convenient as ...
- research-articleNovember 2022
TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 2475–2489https://doi.org/10.1145/3548606.3560698We are witnessing a heightened surge in remote privacy attacks on laptop computers. These attacks often exploit malware to remotely gain access to webcams and microphones in order to spy on the victim users. While webcam attacks are somewhat defended ...
- research-articleNovember 2022
HammerScope: Observing DRAM Power Consumption Using Rowhammer
- Yaakov Cohen,
- Kevin Sam Tharayil,
- Arie Haenel,
- Daniel Genkin,
- Angelos D. Keromytis,
- Yossi Oren,
- Yuval Yarom
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 547–561https://doi.org/10.1145/3548606.3560688The constant reduction in memory cell sizes has increased memory density and reduced power consumption, but has also affected its reliability. The Rowhammer attack exploits this reduced reliability to induce bit flips in memory, without directly ...
- research-articleNovember 2022
Securing Reset Operations in NISQ Quantum Computers
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 2279–2293https://doi.org/10.1145/3548606.3559380A secure reset operation could be an enabling technology that allows sharing of a quantum computer among different users, or among different quantum programs of the same user. Today, the dominant method to erase the qubit state is a full system wipe, ...