-
Dynamic Recognition of Speakers for Consent Management by Contrastive Embedding Replay
Authors:
Arash Shahmansoori,
Utz Roedig
Abstract:
Voice assistants overhear conversations and a consent management mechanism is required. Consent management can be implemented using speaker recognition. Users that do not give consent enrol their voice and all their further recordings are discarded. Building speaker recognition-based consent management is challenging as dynamic registration, removal, and re-registration of speakers must be efficie…
▽ More
Voice assistants overhear conversations and a consent management mechanism is required. Consent management can be implemented using speaker recognition. Users that do not give consent enrol their voice and all their further recordings are discarded. Building speaker recognition-based consent management is challenging as dynamic registration, removal, and re-registration of speakers must be efficiently handled. This work proposes a consent management system addressing the aforementioned challenges. A contrastive based training is applied to learn the underlying speaker equivariance inductive bias. The contrastive features for buckets of speakers are trained a few steps into each iteration and act as replay buffers. These features are progressively selected using a multi-strided random sampler for classification. Moreover, new methods for dynamic registration using a portion of old utterances, removal, and re-registration of speakers are proposed. The results verify memory efficiency and dynamic capabilities of the proposed methods and outperform the existing approach from the literature.
△ Less
Submitted 2 February, 2023; v1 submitted 17 May, 2022;
originally announced May 2022.
-
SonarSnoop: Active Acoustic Side-Channel Attacks
Authors:
Peng Cheng,
Ibrahim Ethem Bagci,
Utz Roedig,
Jeff Yan
Abstract:
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device. For example, a victim's finger movements can be inferred to steal Android phone unlock patterns. In our…
▽ More
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device. For example, a victim's finger movements can be inferred to steal Android phone unlock patterns. In our empirical study, the number of candidate unlock patterns that an attacker must try to authenticate herself to a Samsung S4 Android phone can be reduced by up to 70% using this novel acoustic side-channel. Our approach can be easily applied to other application scenarios and device types. Overall, our work highlights a new family of security threats.
△ Less
Submitted 30 August, 2018;
originally announced August 2018.
-
Strong PUFs from arrays of resonant tunnelling diodes
Authors:
Benjamin Astbury,
Ibrahim Ethem Bagci,
Thomas McGrath,
James Sexton,
Mohamed Missous,
Utz Roedig,
Ramon Bernardo Gavito,
Robert J. Young
Abstract:
In this work, we design and implement a strong physical uncloneable function from an array of individual resonant tunnelling diodes that were previously described to have a unique response when challenged. The system demonstrates the exponential scalability of its responses when compared to the number of devices present in the system, with an expected large set of responses while retaining a 1:1 r…
▽ More
In this work, we design and implement a strong physical uncloneable function from an array of individual resonant tunnelling diodes that were previously described to have a unique response when challenged. The system demonstrates the exponential scalability of its responses when compared to the number of devices present in the system, with an expected large set of responses while retaining a 1:1 relationship with challenges. Using a relatively small set of 16 devices, 256 responses are shown to have promising levels of distinctness and repeatability through multiple measurements.
△ Less
Submitted 23 April, 2018;
originally announced May 2018.
-
Optical identification using imperfections in 2D materials
Authors:
Yameng Cao,
Alexander J. Robson,
Abdullah Alharbi,
Jonathan Roberts,
Christopher S. Woodhead,
Yasir J. Noori,
Ramón Bernardo-Gavito,
Davood Shahrjerdi,
Utz Roedig,
Vladimir I. Falko,
Robert J. Young
Abstract:
The ability to uniquely identify an object or device is important for authentication. Imperfections, locked into structures during fabrication, can be used to provide a fingerprint that is challenging to reproduce. In this paper, we propose a simple optical technique to read unique information from nanometer-scale defects in 2D materials. Flaws created during crystal growth or fabrication lead to…
▽ More
The ability to uniquely identify an object or device is important for authentication. Imperfections, locked into structures during fabrication, can be used to provide a fingerprint that is challenging to reproduce. In this paper, we propose a simple optical technique to read unique information from nanometer-scale defects in 2D materials. Flaws created during crystal growth or fabrication lead to spatial variations in the bandgap of 2D materials that can be characterized through photoluminescence measurements. We show a simple setup involving an angle-adjustable transmission filter, simple optics and a CCD camera can capture spatially-dependent photoluminescence to produce complex maps of unique information from 2D monolayers. Atomic force microscopy is used to verify the origin of the optical signature measured, demonstrating that it results from nanometer-scale imperfections. This solution to optical identification with 2D materials could be employed as a robust security measure to prevent counterfeiting.
△ Less
Submitted 24 June, 2017;
originally announced June 2017.
-
Extracting random numbers from quantum tunnelling through a single diode
Authors:
Ramón Bernardo-Gavito,
Ibrahim Ethem Bagci,
Jonathan Roberts,
James Sexton,
Benjamin Astbury,
Hamzah Shokeir,
Thomas McGrath,
Yasir J. Noori,
Christopher S. Woodhead,
Mohamed Missous,
Utz Roedig,
Robert J. Young
Abstract:
Random number generation is crucial in many aspects of everyday life, as online security and privacy depend ultimately on the quality of random numbers. Many current implementations are based on pseudo-random number generators, but information security requires true random numbers for sensitive applications like key generation in banking, defence or even social media. True random number generators…
▽ More
Random number generation is crucial in many aspects of everyday life, as online security and privacy depend ultimately on the quality of random numbers. Many current implementations are based on pseudo-random number generators, but information security requires true random numbers for sensitive applications like key generation in banking, defence or even social media. True random number generators are systems whose outputs cannot be determined, even if their internal structure and response history are known. Sources of quantum noise are thus ideal for this application due to their intrinsic uncertainty. In this work, we propose using resonant tunnelling diodes as practical true random number generators based on a quantum mechanical effect. The output of the proposed devices can be directly used as a random stream of bits or can be further distilled using randomness extraction algorithms, depending on the application.
△ Less
Submitted 22 June, 2017;
originally announced June 2017.
-
Mitigating Inter-network Interference in LoRa Networks
Authors:
Thiemo Voigt,
Martin Bor,
Utz Roedig,
Juan Alonso
Abstract:
Long Range (LoRa) is a popular technology used to construct Low-Power Wide-Area Network (LPWAN) networks. Given the popularity of LoRa it is likely that multiple independent LoRa networks are deployed in close proximity. In this situation, neighbouring networks interfere and methods have to be found to combat this interference. In this paper we investigate the use of directional antennae and the u…
▽ More
Long Range (LoRa) is a popular technology used to construct Low-Power Wide-Area Network (LPWAN) networks. Given the popularity of LoRa it is likely that multiple independent LoRa networks are deployed in close proximity. In this situation, neighbouring networks interfere and methods have to be found to combat this interference. In this paper we investigate the use of directional antennae and the use of multiple base stations as methods of dealing with inter-network interference. Directional antennae increase signal strength at receivers without increasing transmission energy cost. Thus, the probability of successfully decoding the message in an interference situation is improved. Multiple base stations can alternatively be used to improve the probability of receiving a message in a noisy environment. We compare the effectiveness of these two approaches via simulation. Our findings show that both methods are able to improve LoRa network performance in interference settings. However, the results show that the use of multiple base stations clearly outperforms the use of directional antennae. For example, in a setting where data is collected from 600 nodes which are interfered by four networks with 600 nodes each, using three base stations improves the Data Extraction Rate (DER) from 0.24 to 0.56 while the use of directional antennae provides an increase to only 0.32.
△ Less
Submitted 2 November, 2016;
originally announced November 2016.
-
Using Quantum Confinement to Uniquely Identify Devices
Authors:
J. Roberts,
I. E. Bagci,
M. A. M. Zawawi,
J. Sexton,
N. Hulbert,
Y. J. Noori,
M. P. Young,
C. S. Woodhead,
M. Missous,
M. A. Migliorato,
U. Roedig,
R. J. Young
Abstract:
Modern technology unintentionally provides resources that enable the trust of everyday interactions to be undermined. Some authentication schemes address this issue using devices that give unique outputs in response to a challenge. These signatures are generated by hard-to-predict physical responses derived from structural characteristics, which lend themselves to two different architectures, know…
▽ More
Modern technology unintentionally provides resources that enable the trust of everyday interactions to be undermined. Some authentication schemes address this issue using devices that give unique outputs in response to a challenge. These signatures are generated by hard-to-predict physical responses derived from structural characteristics, which lend themselves to two different architectures, known as unique objects (UNOs) and physically unclonable functions (PUFs). The classical design of UNOs and PUFs limits their size and, in some cases, their security. Here we show that quantum confinement lends itself to the provision of unique identities at the nanoscale, by using fluctuations in tunnelling measurements through quantum wells in resonant tunnelling diodes (RTDs). This provides an uncomplicated measurement of identity without conventional resource limitations whilst providing robust security. The confined energy levels are highly sensitive to the specific nanostructure within each RTD, resulting in a distinct tunnelling spectrum for every device, as they contain a unique and unpredictable structure that is presently impossible to clone. This new class of authentication device operates with few resources in simple electronic structures above room temperature.
△ Less
Submitted 7 January, 2016; v1 submitted 23 February, 2015;
originally announced February 2015.