skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Audio misinformation encoding via an on-phone sub-terahertz metasurface
We demonstrate a wireless security application to protect the weakest link in phone-to-phone communication, using a terahertz metasurface. To our knowledge, this is the first example of an eavesdropping countermeasure in which the attacker is actively misled.  more » « less
Award ID(s):
2211618 2211616 1954780
PAR ID:
10531315
Author(s) / Creator(s):
; ; ; ; ; ;
Publisher / Repository:
Optical Society of America
Date Published:
Journal Name:
Optica
Volume:
11
Issue:
8
ISSN:
2334-2536
Format(s):
Medium: X Size: Article No. 1113
Size(s):
Article No. 1113
Sponsoring Org:
National Science Foundation
More Like this
  1. Lichtner, Valentina (Ed.)
    Human movement and population connectivity inform infectious disease management. Remote data, particularly mobile phone usage data, are frequently used to track mobility in outbreak response efforts without measuring representation in target populations. Using a detailed interview instrument, we measure population representation in phone ownership, mobility, and access to healthcare in a highly mobile population with low access to health care in Namibia, a middle-income country. We find that 1) phone ownership is both low and biased by gender, 2) phone ownership is correlated with differences in mobility and access to healthcare, and 3) reception is spatially unequal and scarce in non-urban areas. We demonstrate that mobile phone data do not represent the populations and locations that most need public health improvements. Finally, we show that relying on these data to inform public health decisions can be harmful with the potential to magnify health inequities rather than reducing them. To reduce health inequities, it is critical to integrate multiple data streams with measured, non-overlapping biases to ensure data representativeness for vulnerable populations. 
    more » « less
  2. Background Inhibitory control, or inhibition, is one of the core executive functions of humans. It contributes to our attention, performance, and physical and mental well-being. Our inhibitory control is modulated by various factors and therefore fluctuates over time. Being able to continuously and unobtrusively assess our inhibitory control and understand the mediating factors may allow us to design intelligent systems that help manage our inhibitory control and ultimately our well-being. Objective The aim of this study is to investigate whether we can assess individuals’ inhibitory control using an unobtrusive and scalable approach to identify digital markers that are predictive of changes in inhibitory control. Methods We developed InhibiSense, an app that passively collects the following information: users’ behaviors based on their phone use and sensor data, the ground truths of their inhibition control measured with stop-signal tasks (SSTs) and ecological momentary assessments (EMAs), and heart rate information transmitted from a wearable heart rate monitor (Polar H10). We conducted a 4-week in-the-wild study, where participants were asked to install InhibiSense on their phone and wear a Polar H10. We used generalized estimating equation (GEE) and gradient boosting tree models fitted with features extracted from participants’ phone use and sensor data to predict their stop-signal reaction time (SSRT), an objective metric used to measure an individual’s inhibitory control, and identify the predictive digital markers. Results A total of 12 participants completed the study, and 2189 EMAs and SST responses were collected. The results from the GEE models suggest that the top digital markers positively associated with an individual’s SSRT include phone use burstiness (P=.005), the mean duration between 2 consecutive phone use sessions (P=.02), the change rate of battery level when the phone was not charged (P=.04), and the frequency of incoming calls (P=.03). The top digital markers negatively associated with SSRT include the standard deviation of acceleration (P<.001), the frequency of short phone use sessions (P<.001), the mean duration of incoming calls (P<.001), the mean decibel level of ambient noise (P=.007), and the percentage of time in which the phone was connected to the internet through a mobile network (P=.001). No significant correlation between the participants’ objective and subjective measurement of inhibitory control was found. Conclusions We identified phone-based digital markers that were predictive of changes in inhibitory control and how they were positively or negatively associated with a person’s inhibitory control. The results of this study corroborate the findings of previous studies, which suggest that inhibitory control can be assessed continuously and unobtrusively in the wild. We discussed some potential applications of the system and how technological interventions can be designed to help manage inhibitory control. 
    more » « less
  3. This paper carries out an analysis of various trade-in programs available for cellphones in the United States. Product trade-in is one of the methods to recover End-of-Life (EoL) products from consumers. Currently, there is a lack of knowledge amongst consumers about such programs. The study aims to determine the factors which influence the product trade-in price. Cell phone trade-in programs of the following types of companies are studied: Phone network operator, online retailer and recycler, and educational institution. Apple’s iPhone was selected to carry out a case study to analyze various features of the trade-in programs. Age of the cell phone model, memory size of the phone, cellphone condition and phone carrier were found to be the most significant factors of a cell phone trade-in program. Newer phone models and higher memory size capacity phones were found to be offered higher price to the consumer. Cellphones of one particular phone carrier and unlocked cell phones were found to obtain the highest price quote. An attempt is made to evaluate and discuss the prospect of trade-in programs as an effective end of life recovery method. Product recovery by trade-in programs and conventional methods is compared based on factors drawn from consumer behavior studies. Improvements in trade-in programs are suggested, followed by a discussion on ways in which data from trade-in programs can benefit product designers. 
    more » « less
  4. In many VoIP systems, Voice Activity Detection (VAD) is often used on VoIP traffic to suppress packets of silence in order to reduce the bandwidth consumption of phone calls. Unfortunately, although VoIP traffic is fully encrypted and secured, traffic analysis of this suppression can reveal identifying information about calls made to customer service automated phone systems. Because different customer service phone systems have distinct, but fixed (pre-recorded) automated voice messages sent to customers, VAD silence suppression used in VoIP will enable an eavesdropper to profile and identify these automated voice messages. In this paper, we will use a popular enterprise VoIP system (Cisco CallManager), running the default Session Initiation Protocol (SIP) protocol, to demonstrate that an attacker can reliably use the silence suppression to profile calls to such VoIP systems. Our real-world experiments demonstrate that this side-channel profiling attack can be used to accurately identify not only what customer service phone number a customer calls, but also what following options are subsequently chosen by the caller in the phone conversation. 
    more » « less
  5. Gross, Thomas; Vigano, Luca (Ed.)
    We present the results of a research study in which participants were subjected to social engineering attacks via telephone, telephone scams, in order to determine the features of scams which peopleare most susceptible to. The study has involved 186 university participants who were attacked with one of 27 different attack scripts which span different independent variables including the pretext used and the method of elicitation. In order to ensure informed consent, each participant was warned that they would receive a scam phone call within 3 months. One independent variable used is the time between the warning and launching the scam. In spite of this warning, a large fraction of participants were still deceived by the scam. A limitation to research in the study of telephone scams is the lack of a dataset of real phone scams for examination. Each phone call in our study was recorded and we present the dataset of these recordings, and their transcripts. To our knowledge, there is no similar publicly-available dataset or phone scams. We hope that our dataset will support future research in phone scams and their detection. 
    more » « less