- Advanced Malware Detection Techniques
- Cryptographic Implementations and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Internet Traffic Analysis and Secure E-voting
- User Authentication and Security Systems
- Digital Media Forensic Detection
- Network Security and Intrusion Detection
- Context-Aware Activity Recognition Systems
- Wireless Signal Modulation Classification
- Metallurgical and Alloy Processes
- Advanced materials and composites
- Chaos-based Image/Signal Encryption
- Speech and Audio Processing
- Speech and dialogue systems
- Biometric Identification and Security
- Spam and Phishing Detection
- EEG and Brain-Computer Interfaces
- Metal and Thin Film Mechanics
- Speech Recognition and Synthesis
Zhejiang University
2018-2023
With the widespread use of smart devices, device authentication has received much attention. One popular method for is to utilize internally-measured fingerprints, such as ID, software or hardware-based characteristics. In this paper, we propose DeMiCPU, a stimulation-response-based fingerprinting technique that relies on externally-measured information, i.e., magnetic induction (MI) signals emitted from CPU module consists chip and its affiliated power supply circuits. The key insight...
Fake base station (FBS) crime is a type of wireless communication that has appeared recently. The key to enforcing the laws on regulating FBS based not only arrest but also convict criminals effectively. Much work discovering, localization, and tracking can assist arresting, problem collecting evidence accurately support proper conviction been addressed yet.
Voice assistants can be manipulated by various malicious voice commands, yet existing attacks require a nearby speaker to play the attack commands. In this paper, we show that even when no speakers are available, commands utilizing capacitors inside electronic devices, i.e., convert into and call it CapSpeaker. Essentially, emit acoustic noises due inverse piezoelectric effect, varying voltage across capacitor make vibrate thus noises. Forcing is challenging because (1) frequency responses...
Air-gapped networks achieve security by using the physical isolation to keep computers and network from Internet. However, magnetic covert channels based on CPU utilization have been proposed help secret data escape Faraday-cage air-gap. Despite success of such cover channels, they suffer high risk being detected transmitter computer challenge installing malware into a computer. In this paper, we propose MagView, distributed channel, where sensitive information is embedded in other as video...
Ransomware is a kind of computer malware that has spread widely in recent years, such as DarkSide, which around the world recently. It's reported DarkSide extorted ${\$}$ 90 million nine months. It extorts ransom from users by encrypting user files and other methods, causing huge economic losses to users, including commercial organizations individuals. Existing ransomware detection methods include hostbased network-based methods. However, these are either hard deploy or have possibility be...
Nowadays, most Internet of Things devices in smart homes rely on radio frequency channels for communication, making them exposed to various attacks such as spoofing and eavesdropping attacks. Existing methods using encryption keys may be inapplicable these resource-constrained that cannot afford the computationally expensive operations. Thus, this article, we design a key-free communication method home. In particular, introduce Home-limited Channel (HLC) can accessed only within house yet...
Nowadays most IoT devices in smart homes rely on radio frequency channels for communication, making them exposed to various attacks. Existing methods using encryption keys may be inapplicable these resource-constrained that cannot afford the computationally expensive operations. Thus, this paper we design a key-free communication method such devices. In particular, introduce Home-limited Channel (HLC) can accessed only within house yet inaccessible an outside-house attacker. Utilizing HLCs,...
Trade secrets such as intellectual properties are the inherent values for firms. Although companies have exploited strict access management policies and isolated their networks from public Internet, trade still vulnerable to side-channel attacks. Side-channels can reveal computing processes of computers in forms various physical signals light, electromagnetism, even heat. Such side-channels bypass isolation mechanism therefore bring about severe threats. However, existing only perform well...
Air-gapped networks achieve security by using physical isolation to keep the computers and network from Internet. However, magnetic covert channels based on CPU utilization have been proposed help secret data exfiltrate Faraday-cage air gap. Despite success of such channels, they suffer high risk being detected transmitter computer challenge installing malware into a computer. In this article, we propose <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML"...
Recent studies have exposed that voice assistants can be manipulated by various commands without being noticed, however, existing attacks require a nearby speaker to play the attack commands. In this paper, we demonstrate even speaker, use capacitors inside electronic devices produce malicious commands, i.e., convert into speakers and call it <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">CapSpeaker</monospace> . The underlying principle...
With the widespread use of smart devices, device authentication has received much attention. One popular method for is to utilize internally measured fingerprints, such as ID, software or hardware-based characteristics. In this article, we propose DeMiCPU , a stimulation-response-based fingerprinting technique that relies on externally information, i.e., magnetic induction (MI) signals emitted from CPU module consists chip and its affiliated power-supply circuits. The key insight hardware...