论文部分内容阅读
什么是恶意软件?恶意软件本身可能是一种病毒,它通过动态地改变,从而攻击代码,逃避入侵检测系统的特征检测。攻击者常常利用这种多变代码,进入网上带有入侵侦测的系统。想要电脑一直保持较高的安全性吗?看看这是如何操作的!
Security researchers have developed malware that can capture keystrokes from a computer and hijack the soundcard to broadcast the data to a nearby machine as a high-frequency sound which cannot be heard by humans.
In extremely high-security environments it is common practice to create an "air gap" between PCs containing sensitive information and others which are connected to the Internet, in order to prevent remote malicious attacks. This research proves that it would be possible to use computer speakers and microphones to bridge this gap and send sensitive information back to a remote attacker, which authors warned was a "considerable threat to computer security".
Speakers and microphones are often overlooked in security planning, and by using frequencies outside the range of human hearing, it is likely that such messages could escape detection even when they are beamed across an office full of staff.
Vocabularies

Security researchers have developed malware that can capture keystrokes from a computer and hijack the soundcard to broadcast the data to a nearby machine as a high-frequency sound which cannot be heard by humans.
In extremely high-security environments it is common practice to create an "air gap" between PCs containing sensitive information and others which are connected to the Internet, in order to prevent remote malicious attacks. This research proves that it would be possible to use computer speakers and microphones to bridge this gap and send sensitive information back to a remote attacker, which authors warned was a "considerable threat to computer security".
Speakers and microphones are often overlooked in security planning, and by using frequencies outside the range of human hearing, it is likely that such messages could escape detection even when they are beamed across an office full of staff.
Vocabularies
