Archive for the ‘Blog’ Category
Leveraging Machine Learning to Enhance Acoustic Eavesdropping Attacks (Part 2 of 4)
October 16th, 2025 by Brian
Based on the previous introduction, we now work to test what is published to see the current status. Initial Testing Our initial goal was to confirm that the gyroscope and accelerometer could sample at frequencies high enough (and with low enough noise) to preserve audio data. According to the Nyquist-Shannon sampling theorem, we can reconstruct… » Read More
Leveraging Machine Learning to Enhance Acoustic Eavesdropping Attacks (Part 1 of 4)
October 14th, 2025 by Brian
This multi-part series explores how machine learning can enhance eavesdropping on cellular audio using gyroscopes and accelerometers — inertial sensors commonly built into mobile devices to measure motion through Micro-Electro-Mechanical Systems (MEMS) technology. The research was conducted over the summer by one of our interns, Alec K., and a newly hired full-time engineer, August H. Introduction… » Read More
At Caesar Creek Software, we routinely perform cybersecurity assessments of medical devices to help companies achieve FDA 510(k) approval for new products. As part of our ongoing research and training, we also conduct internal audits of popular medical devices to stay current with the latest security trends and provide our engineers with hands-on experience. In… » Read More
Previously, we were examining the instruction set. Now, it is time to conduct some microarchitectural attacks! Investigating Microarchitectural Attacks This page gives an overview of some of the microarchitectural attacks we have attempted on the Loongson dev board and our corresponding findings. Spectre Our first successful proof of concept (PoC) was for Spectre-v1. This led… » Read More
Previously, we discussed the dev board and Linux setup. Now, time to fuzz the instruction set. Loongshaker Overview Our first goal was to search for hidden or buggy instructions in the new LoongArch architecture. LoongArch is a RISC architecture with fixed-width (32-bit) instructions. As such, we decided to port armshaker to LoongArch. This program uses… » Read More
