Show simple item record

dc.contributor.authorSiegel, Joshua Eric
dc.contributor.authorSarma, Sanjay E
dc.date.accessioned2020-11-16T22:29:31Z
dc.date.available2020-11-16T22:29:31Z
dc.date.issued2019-05
dc.identifier.issn1540-7993
dc.identifier.issn1558-4046
dc.identifier.urihttps://hdl.handle.net/1721.1/128496
dc.description.abstractWe present techniques for bridging the Internet of Things air gap using device speakers to communicate with voice assistants and propose methods to protect critical applications from such attacks. Approaches include two-factor authentication, contextual monitoring, and source metadata embedding.en_US
dc.language.isoen
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/msec.2019.2901430en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceOther repositoryen_US
dc.titleUsing Open Channels to Trigger the Invited, Unintended Consequences of the Internet of Thingsen_US
dc.typeArticleen_US
dc.identifier.citationSiegel, Joshua Eric and Sanjay Sarma. "Using Open Channels to Trigger the Invited, Unintended Consequences of the Internet of Things." IEEE Security and Privacy 17, 3 (May 2019): 49 - 55 © 2019 IEEEen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Mechanical Engineeringen_US
dc.relation.journalIEEE Security and Privacyen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dc.date.updated2020-08-04T19:01:08Z
dspace.date.submission2020-08-04T19:01:10Z
mit.journal.volume17en_US
mit.journal.issue3en_US
mit.licenseOPEN_ACCESS_POLICY
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record