0 citations
Cell Phone Detection Techniques
2007
Richard M. Pratt, Kyle J. Bunch, David J. Puzycki, Ryan W. Slaugh, Morris S. Good, Douglas L. McMakin
Abstract
A team composed of Rick Pratt, Dave Puczyki, Kyle Bunch, Ryan Slaugh, Morris Good, and Doug McMakin teamed together to attempt to exploit cellular telephone features and detect if a person was carrying a cellular telephone into a Limited Area. The cell phone’s electromagnetic properties were measured, analyzed, and tested in over 10 different ways to determine if an exploitable signature exists. The method that appears to have the most potential for success without adding an external tag is to measure the RF spectrum, not in the cell phone band, but between 240 and 400MHz. Figures 1- 7 show the detected signal levels from cell phones from three different manufacturers.
Related Papers
- → AEG: Automatic Exploit Generation(2018)209 cited
- → Automated Crash Analysis and Exploit Generation with Extendable Exploit Model(2022)4 cited
- → AEMB: An Automated Exploit Mitigation Bypassing Solution(2021)5 cited
- Evaluation of Two Host-Based Intrusion Prevention Systems(2005)
- → EBF: Event-Based Filter for Exploit Containment(2021)