6.s062: mobile and sensor computing · spoofing gps signals. pacemaker security wireless control...

77
6.S062: Mobile and Sensor Computing Lecture 14: IoT Security Physical Security and Acous9c A:acks Some material adapted from Nirupam Roy (UIUC)

Upload: others

Post on 19-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

6.S062: Mobile and Sensor Computing

Lecture14:IoTSecurityPhysicalSecurityandAcous9cA:acks

Some material adapted from Nirupam Roy (UIUC)

Page 2: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Mobile Security Inaudible Voice Commands

Page 3: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 4: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 5: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Analog Sensor Security Acoustic Attacks on MEMS

Accelerometers

Page 6: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 7: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 8: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 9: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Drone Security Spoofing GPS Signals

Page 10: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 11: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Pacemaker Security Wireless Control of Pacemaker

Page 12: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 13: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

BackDoor: Making Microphones Hear Inaudible Sounds

Page 14: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphones are everywhere

Page 15: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphones are everywhere

Page 16: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Speaker

Audible sound

Microphones record audible sounds

I hear that

I record that

Page 17: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Inaudible, but recordable !

Speaker

Page 18: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Inaudible, but recordable !

Speaker

I can’t hear that

I record that

Page 19: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Speaker

Works with unmodified devices

CameraSmartwatch

Laptop Hearing Aid

Page 20: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Near-ultrasound

It’s not “near-ultrasound”

50k40k10k

Ampl

itud

e

Frequency20k 30k

Page 21: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphonehardware

Exploiting fundamental nonlinearity

50k40k10k

Ampl

itud

e

20k 30k Frequency

Page 22: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

What can we do with it?

Page 23: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Application: Acoustic jammer

Page 24: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Application: Acoustic communication

$ 5.00

Page 25: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Threat: Acoustic DOS attack

Page 26: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Jamminghearing aids

Threat: Acoustic DOS attack

Page 27: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Jamminghearing aids

Threat: Acoustic DOS attack

Blocking911 calls

Page 28: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Talk outline

Microphone Overview1

System Design2

Challenges3

Evaluation4

Page 29: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Talk outline

Microphone Overview1

System Design2

Challenges3

Evaluation4

Page 30: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphone working principle

Amplifier Filter ADCDiaphragm

Page 31: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphone working principle

Diaphragm Amplifier Filter ADC

Page 32: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphone working principle

Amplifier Filter ADC

Ampl

itud

e

10kFrequency

20k 30k 40k 50k 60k 70k 80k 90k 100k

Diaphragm

Page 33: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphone working principle

Amplifier Filter ADC

Ampl

itud

e

10kFrequency

20k 30k 40k 50k 60k 70k 80k 90k 100k

Diaphragm

Page 34: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphone working principle

Amplifier Filter ADC

Ampl

itud

e

10kFrequency

20k 30k 40k 50k 60k 70k 80k 90k 100k

Diaphragm

Page 35: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphone working principle

Amplifier Filter ADC

Ampl

itud

e

10kFrequency

20k 30k 40k 50k 60k 70k 80k 90k 100k

Diaphragm

Page 36: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphone working principle

Amplifier Filter ADC

Microphone filter

Diaphragm

10kFrequency

20k 30k 40k 50k 60k 70k 80k 90k 100k

Ampl

itud

e

Page 37: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Diaphragm

Microphone working principle

Amplifier Filter ADC

Microphone filter

Ampl

itud

e

10kFrequency

20k 30k 40k 50k 60k 70k 80k 90k 100k

Page 38: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphone working principle

Input

Out

put

Vin

Vout

Vout = a1Vin

InputOut

put

Vout = a1Vin+ a2Vin2+ a3Vin

3+…

Amplifier

10k

Frequency20k 30k 40k 50k 60k 70k 80k 90k 100k

Page 39: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphone working principle

Input

Out

put

Vin

Vout

Vout = a1Vin

10k

Frequency20k 30k 40k 50k 60k 70k 80k 90k 100k

InputOut

put

Vout = a1Vin+ a2Vin2

Amplifier

Page 40: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Microphone working principle

Input

Out

put

Vin

Vout

Vout = a1Vin

10k

Frequency20k 30k 40k 50k 60k 70k 80k 90k 100k

InputOut

put

Amplifier

Vout = a1Vin+ a2Vin2

Page 41: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Talk outline

Microphone Overview1

System Design2

Challenges3

Evaluation4

Page 42: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Exploiting amplifier non-linearityAm

plit

ude Microphone

filter

F1= 50kHzF2= 40kHz

F1F2

10kFrequency

20k 30k 40k 50k 60k 70k 80k 90k 100k

Page 43: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Vout = a1Vin+ a2Vin2

Exploiting amplifier non-linearityAm

plit

ude Microphone

filter

F1= 50kHzF2= 40kHz

( sin F1 + sin F2 )2 = cos 2F1 + cos 2F2 + cos (F1+F2) + cos (F1- F2)

F1F2

10kFrequency

20k 30k 40k 50k 60k 70k 80k 90k 100k

Page 44: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Vout = a1Vin+ a2Vin2

Exploiting amplifier non-linearityAm

plit

ude Microphone

filter

F1= 50kHzF2= 40kHz

F1F2

( sin F1 + sin F2 )2 = cos 2F1 + cos 2F2 + cos (F1+F2) + cos (F1- F2)

2F2 (F1+F2) 2F1

10kFrequency

20k 30k 40k 50k 60k 70k 80k 90k 100k

Page 45: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

2F2 (F1+F2) 2F1

Vout = a1Vin+ a2Vin2

Exploiting amplifier non-linearityAm

plit

ude F1F2

( sin F1 + sin F2 )2 = cos 2F1 + cos 2F2 + cos (F1+F2) + cos (F1- F2)

F1= 50kHzF2= 40kHz

Microphone filter

10kFrequency

20k 30k 40k 50k 60k 70k 80k 90k 100k

Page 46: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

2F2 (F1+F2) 2F1

Vout = a1Vin+ a2Vin2

Exploiting amplifier non-linearityAm

plit

ude F1F2

( sin F1 + sin F2 )2 = cos 2F1 + cos 2F2 + cos (F1+F2) + cos (F1- F2)

F1= 50kHzF2= 40kHz

Microphone filter

(F1-F2)

10kFrequency

20k 30k 40k 50k 60k 70k 80k 90k 100k

Page 47: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Exploiting amplifier non-linearityAm

plit

ude F1F2

F1= 50kHzF2= 40kHz

Microphone filter

10kFrequency

20k 30k 40k 50k 60k 70k 80k 100k90k

(F1-F2)

Page 48: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Exploiting amplifier non-linearityAm

plit

ude F1F2

F1= 50kHzF2= 40kHz

Microphone filter

10kFrequency

20k 30k 40k 50k 60k 70k 80k 90k 100k

(F1-F2)

Page 49: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Talk outline

Microphone Overview1

System Design2

Challenges3

Evaluation4

Page 50: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Challenges

Ultrasonic speaker

Amplitude modulation

Problem: speaker has non-linearities=> Audible sound

Page 51: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Challenges

Ultrasonic speaker

Frequency modulation

Wenyuan Xu

Page 52: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Primer on Modulation

Page 53: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 54: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 55: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 56: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 57: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Challenges

Ultrasonic speaker

Frequency modulation

Wenyuan Xu

Page 58: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 59: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

2

Page 60: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Challenges

Ultrasonic speaker

Frequency modulation

Problem: microphone can’t measure

inaudible sound

Wenyuan Xu

Page 61: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Solution?

Ultrasonic speaker

Add another speaker How do we structure its

signal?

Page 62: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are
Page 63: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Talk outline

Microphone Overview1

System Design2

Challenges3

Evaluation4

Page 64: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Hardware generalizability

40 kHz

50 kHz

Hearing Aid

Camera iPhone Androidphone

Smartwatch Laptop

Hearing!aids!

Camera!

iPhone!

Android!phone!

Smart-w

atch!

Laptop!

BackDoor!Signal!(dB)!

Devices!

60!

40!

20!

0!

Page 65: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Implementation

Communication prototype

Jammerprototype

Page 66: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Communication performance

FM data packets

4kbpsup to 1 meter

More power can increase the distance

Page 67: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Jamming performance

BackDoor jammer

Spymicrophone

Page 68: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Jamming performance

BackDoor jammer

Spymicrophone

Page 69: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Jamming performance

BackDoor jammer

Spymicrophone

Page 70: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Jamming performance

BackDoor jammer

Spymicrophone

Page 71: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Jamming performance

BackDoor jammer

Spymicrophone

Page 72: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Jamming performance

BackDoor jammer

Jammed recording

2000 spoken words

Page 73: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Jamming performance

BackDoor jammer

Jammed recording

Humanlistener

Speech recognition

2000 spoken words

Page 74: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Jamming performance

BackDoor jammer

Jammed recording

Humanlistener

Speech recognition

% of legible words

2000 spoken words

Page 75: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Jamming performance100

80

60

40

20

0

1.0m

1.5m

2.0m

No Jam2.5m

3.0m

3.5m

4.0m

4.5m

5.0m

Jamming distance

Legi

bilit

y of

wor

ds (%

)Human users

Automatic speech recognition

Page 76: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

How would you design a system to secure against this attack?

Page 77: 6.S062: Mobile and Sensor Computing · Spoofing GPS Signals. Pacemaker Security Wireless Control of Pacemaker. BackDoor: Making Microphones Hear Inaudible Sounds . Microphones are

Summary

•IoT Security: both digital and analog •“Sensor” security & attacks:

- Mobile acoustic attacks (inaudible voice commands) - Analog Sensor attacks (on MEMS accelerometers) - Drone Security (Spoofing GPS) - Medical Security (Hacking Pacemakers)

•Modulation schemes - AM - FM - Inter-modulation

•Fundamentals have implications beyond IoT (e.g., Cuban “acoustic attack”)