Oct. 6, 2023, 1:10 a.m. | Hayyu Imanda, Kasper Rasmussen

cs.CR updates on arXiv.org arxiv.org

In this paper we propose a protocol that can be used to covertly send a
distress signal through a seemingly normal webserver, even if the adversary is
monitoring both the network and the user's device. This allows a user to call
for help even when they are in the same physical space as their adversaries. We
model such a scenario by introducing a strong adversary model that captures a
high degree of access to the user's device and full control …

adversary alice call covert device monitoring network normal presence protocol send signal webserver

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Network Security Engineer

@ Meta | Menlo Park, CA | Remote, US

Security Engineer, Investigations - i3

@ Meta | Washington, DC

Threat Investigator- Security Analyst

@ Meta | Menlo Park, CA | Seattle, WA | Washington, DC

Security Operations Engineer II

@ Microsoft | Redmond, Washington, United States

Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Bug Bounty -- Associate -- Dallas

@ Goldman Sachs | Dallas, Texas, United States