-
Categories
-
Pharmaceutical Intermediates
-
Active Pharmaceutical Ingredients
-
Food Additives
- Industrial Coatings
- Agrochemicals
- Dyes and Pigments
- Surfactant
- Flavors and Fragrances
- Chemical Reagents
- Catalyst and Auxiliary
- Natural Products
- Inorganic Chemistry
-
Organic Chemistry
-
Biochemical Engineering
- Analytical Chemistry
-
Cosmetic Ingredient
- Water Treatment Chemical
-
Pharmaceutical Intermediates
Promotion
ECHEMI Mall
Wholesale
Weekly Price
Exhibition
News
-
Trade Service
Researchers at the University of California, Irvine, have found that safe operations in negative pressure chambers (spaces in hospitals or biological research labs designed to protect exterior areas from exposure to deadly pathogens) can be compromised
by attackers armed only with smartphones.
According to UCI's cyber-physical systems security experts who recently shared their findings with attendees at the Computer and Communications Security Conference in Los Angeles, said that the mechanisms that control the airflow in and out of biological control facilities can be tricked into working irregularly by a sound of a particular frequency that may be hidden in
popular songs.
Senior co-author Mohammad Al Faruque, professor of electrical engineering and computer science at UCI, said: "People can play a piece of music on a smartphone, or on a TV or other audio device in or near a negative pressure room
.
" "If the tone embedded in the music matches the pressure-controlled resonant frequency of one of the spaces, it can lead to malfunctions and leakage
of deadly microorganisms.
"
Heating, ventilation and air conditioning infrastructure maintains the inflow of fresh air and the outflow
of polluted air within a given space.
HVAC systems in scientific facilities often include room pressure monitors, which in turn utilize differential pressure sensors to compare the atmosphere
inside and outside the room.
Commonly used DDPs are vulnerable to remote operation, posing a previously unrecognized threat
to biosecurity facilities, the researchers said.
They tested their hypothesis on 8 industry-standard DPS from 5 manufacturers, proving that all devices have resonant frequencies within the audible range and, therefore, are vulnerable to tampering
.
"When a sound wave collides with the diaphragm inside the DPS, it starts to vibrate at the same frequency," said
lead author Anomadarshi Barua, a doctoral candidate in electrical engineering and computer science at UCI.
"An informed attacker can use this technique to artificially replace diaphragms, alter pressure readings, and cause the entire system to fail
.
"
He said attackers could compromise the negative pressure chamber system
in a number of ways.
They can operate the devices wirelessly, or pretend to be maintenance personnel and place an audio device
in or near such a room.
"More sophisticated attacks may involve perpetrators embedding sound emission technology into DPS before they are installed in biological containment facilities
," Barua said.
In their conference report, the researchers propose several countermeasures
to prevent music from attacking biosecurity facilities.
Acoustic damping
can be achieved by extending the sampling tube of the DPS port by up to 7 meters.
The team also recommends enclosing the pressure port in
a box-like structure.
Both measures will reduce the sensitivity
of DPS, Barua said.
Al Faruque said the research project demonstrated the vulnerability of embedded systems to random attacks, but stressed that with a little planning and forethought, facilities can be enhanced to
withstand sabotage.
Joining Al Faruque and Barua in the study was UCI electrical engineering and computer science doctoral student Yonatan Gizachew Achamyeleh, which received financial support
from the National Science Foundation.