YoVDO

Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Wireless Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a critical security vulnerability in wireless charging systems through this 16-minute IEEE conference talk. Discover how researchers from The Hong Kong Polytechnic University demonstrate the potential for inaudible command attacks by manipulating wireless chargers. Learn about the techniques used to induce wireless chargers to generate voice commands, the implications for device security, and potential countermeasures against this novel attack vector. Gain insights into the intersection of wireless charging technology and cybersecurity, and understand the importance of addressing emerging threats in smart device ecosystems.

Syllabus

Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Sensor Security
IEEE via YouTube
Tracking Ransomware End-to-end
IEEE via YouTube
Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube
Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube
Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube