Skip to main content

Showing 1–7 of 7 results for author: Roedig, U

.
  1. arXiv:2205.08459  [pdf, other

    cs.SD cs.LG eess.AS

    Dynamic Recognition of Speakers for Consent Management by Contrastive Embedding Replay

    Authors: Arash Shahmansoori, Utz Roedig

    Abstract: Voice assistants overhear conversations and a consent management mechanism is required. Consent management can be implemented using speaker recognition. Users that do not give consent enrol their voice and all their further recordings are discarded. Building speaker recognition-based consent management is challenging as dynamic registration, removal, and re-registration of speakers must be efficie… ▽ More

    Submitted 2 February, 2023; v1 submitted 17 May, 2022; originally announced May 2022.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. The current version includes 36 pages, 8 figures, and 3 tables

  2. arXiv:1808.10250  [pdf, other

    cs.CR

    SonarSnoop: Active Acoustic Side-Channel Attacks

    Authors: Peng Cheng, Ibrahim Ethem Bagci, Utz Roedig, Jeff Yan

    Abstract: We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device. For example, a victim's finger movements can be inferred to steal Android phone unlock patterns. In our… ▽ More

    Submitted 30 August, 2018; originally announced August 2018.

  3. arXiv:1805.03246  [pdf

    physics.app-ph

    Strong PUFs from arrays of resonant tunnelling diodes

    Authors: Benjamin Astbury, Ibrahim Ethem Bagci, Thomas McGrath, James Sexton, Mohamed Missous, Utz Roedig, Ramon Bernardo Gavito, Robert J. Young

    Abstract: In this work, we design and implement a strong physical uncloneable function from an array of individual resonant tunnelling diodes that were previously described to have a unique response when challenged. The system demonstrates the exponential scalability of its responses when compared to the number of devices present in the system, with an expected large set of responses while retaining a 1:1 r… ▽ More

    Submitted 23 April, 2018; originally announced May 2018.

    Comments: 2 pages, 2 figures, 1 table

  4. arXiv:1706.07949  [pdf, other

    cond-mat.mes-hall cond-mat.mtrl-sci physics.app-ph

    Optical identification using imperfections in 2D materials

    Authors: Yameng Cao, Alexander J. Robson, Abdullah Alharbi, Jonathan Roberts, Christopher S. Woodhead, Yasir J. Noori, Ramón Bernardo-Gavito, Davood Shahrjerdi, Utz Roedig, Vladimir I. Falko, Robert J. Young

    Abstract: The ability to uniquely identify an object or device is important for authentication. Imperfections, locked into structures during fabrication, can be used to provide a fingerprint that is challenging to reproduce. In this paper, we propose a simple optical technique to read unique information from nanometer-scale defects in 2D materials. Flaws created during crystal growth or fabrication lead to… ▽ More

    Submitted 24 June, 2017; originally announced June 2017.

    Comments: 14 pages, 5 figures

  5. arXiv:1706.07348  [pdf

    quant-ph cond-mat.mes-hall

    Extracting random numbers from quantum tunnelling through a single diode

    Authors: Ramón Bernardo-Gavito, Ibrahim Ethem Bagci, Jonathan Roberts, James Sexton, Benjamin Astbury, Hamzah Shokeir, Thomas McGrath, Yasir J. Noori, Christopher S. Woodhead, Mohamed Missous, Utz Roedig, Robert J. Young

    Abstract: Random number generation is crucial in many aspects of everyday life, as online security and privacy depend ultimately on the quality of random numbers. Many current implementations are based on pseudo-random number generators, but information security requires true random numbers for sensitive applications like key generation in banking, defence or even social media. True random number generators… ▽ More

    Submitted 22 June, 2017; originally announced June 2017.

    Comments: 11 pages, 4 figures, 1 table

    Journal ref: Scientific Reports 7, 17879 (2017)

  6. arXiv:1611.00688  [pdf, other

    cs.NI

    Mitigating Inter-network Interference in LoRa Networks

    Authors: Thiemo Voigt, Martin Bor, Utz Roedig, Juan Alonso

    Abstract: Long Range (LoRa) is a popular technology used to construct Low-Power Wide-Area Network (LPWAN) networks. Given the popularity of LoRa it is likely that multiple independent LoRa networks are deployed in close proximity. In this situation, neighbouring networks interfere and methods have to be found to combat this interference. In this paper we investigate the use of directional antennae and the u… ▽ More

    Submitted 2 November, 2016; originally announced November 2016.

  7. arXiv:1502.06523  [pdf

    cond-mat.mtrl-sci cond-mat.mes-hall quant-ph

    Using Quantum Confinement to Uniquely Identify Devices

    Authors: J. Roberts, I. E. Bagci, M. A. M. Zawawi, J. Sexton, N. Hulbert, Y. J. Noori, M. P. Young, C. S. Woodhead, M. Missous, M. A. Migliorato, U. Roedig, R. J. Young

    Abstract: Modern technology unintentionally provides resources that enable the trust of everyday interactions to be undermined. Some authentication schemes address this issue using devices that give unique outputs in response to a challenge. These signatures are generated by hard-to-predict physical responses derived from structural characteristics, which lend themselves to two different architectures, know… ▽ More

    Submitted 7 January, 2016; v1 submitted 23 February, 2015; originally announced February 2015.

    Comments: 13 pages, 3 figures

    Journal ref: Scientific Reports 5, 16456 (2015)