{"id":30742,"date":"2025-10-30T14:33:58","date_gmt":"2025-10-30T08:48:58","guid":{"rendered":"https:\/\/www.revoscience.com\/en\/?p=30742"},"modified":"2025-10-30T14:34:00","modified_gmt":"2025-10-30T08:49:00","slug":"newly-funded-research-to-develop-defenses-against-wireless-inference-threats","status":"publish","type":"post","link":"https:\/\/www.revoscience.com\/en\/newly-funded-research-to-develop-defenses-against-wireless-inference-threats\/","title":{"rendered":"Newly funded research to develop defenses against wireless inference threats"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><img data-dominant-color=\"eed088\" data-has-transparency=\"false\" loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"576\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" src=\"https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless.webp\" alt=\"\" class=\"wp-image-30743 not-transparent\" style=\"--dominant-color: #eed088; width:840px;height:auto\" title=\"\" srcset=\"https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless.webp 768w, https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-675x506.webp 675w, https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-150x113.webp 150w\" \/><figcaption class=\"wp-element-caption\"><em><sup>DeepAI-generated Image<\/sup><\/em><\/figcaption><\/figure>\n\n\n\n<p><strong>NORMAN, Okla.&nbsp;\u2013&nbsp;<\/strong>Song Fang, a researcher with the University of Oklahoma, has been awarded funding from the U.S. National Science Foundation to create training-free detection methods and novel countermeasures to protect sensitive information from emerging wireless eavesdropping techniques.<\/p>\n\n\n\n<p>Wi-Fi networks blanket homes, offices and public spaces, but a little-known security vulnerability lurks in the signals that keep people online. The ability of attackers to intercept keystrokes and private conversations via wireless signals alone, without malware, cameras or physical access to devices,\u00a0leaves people highly vulnerable. <\/p>\n\n\n\n<p>Fang\u2019s project will address this vulnerability by developing both advanced inference methods and practical defenses against wireless eavesdropping, marking a significant step forward in protecting user privacy in an increasingly connected world.<\/p>\n\n\n\n<p>Though wireless signals are complex and depend on their surrounding physical environment, Fang compares their vulnerabilities to music.<\/p>\n\n\n\n<p>\u201cThink of these signals as invisible strings stretched throughout the environment. When someone types, speaks or moves, these actions gently \u2018strum\u2019 the strings, producing unique vibrations, like music, that subtly change the wireless signal patterns,\u201d said Fang, a professor in the School of Computer Science.<\/p>\n\n\n\n<p>\u201cAn unauthorized listener can \u2018hear\u2019 this music by analyzing how the signals fluctuate. By recognizing these patterns, the eavesdropper can infer which strings were plucked \u2013 in other words, which specific motions or activities, such as keystrokes or spoken words, occurred.\u201d<\/p>\n\n\n\n<p>The completely wireless nature of this vulnerability makes it especially concerning for everyday users, but previous inference methods were often impractical. This research marks a pivotal shift in the understanding of and defense against wireless-based privacy threats, which previously required a training phase to learn the relationship between signal changes and the corresponding content. By eliminating the need for training data, the project introduces a more agile approach to wireless inference, one that can operate in unfamiliar environments and adapt to new users without prior calibration.<\/p>\n\n\n\n<p>\u201cTraditional approaches are like a musician who must practice for a long time before recognizing which strings are plucked by listening to a piece of music. In contrast, our training-free wireless inference technique enables an ordinary listener to tell which strings were plucked after hearing the music only once, without any prior training or repetition,\u201d Fang said.<\/p>\n\n\n\n<p>Fang will develop proactive countermeasures that manipulate wireless channels to obscure or distort the signal patterns that attackers rely on. These defenses work by injecting misleading variations into the wireless environment, effectively scrambling the signal \u201cmusic\u201d that an eavesdropper might try to interpret. The result is a new class of security tools that can cloak sensitive activities without disrupting normal device function.<\/p>\n\n\n\n<p>\u201cWireless channel manipulation aims to confuse wireless inference systems by deliberately changing the wireless channel measured by an eavesdropper. The signals the attacker observes still appear natural, but they no longer reflect the user\u2019s real movements. In short, the defender intentionally alters the wireless signal patterns, so the inferred result is wrong or meaningless,\u201d he said.<\/p>\n\n\n\n<p>Much of modern life is dependent on wireless devices, and the ability to infer human activity from ambient signals is both a powerful tool and a potential threat. This project not only exposes the vulnerabilities of current wireless systems but will also lay the groundwork for a new generation of privacy-preserving technologies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NORMAN, Okla.\u00a0\u2013\u00a0Song Fang, a researcher with the University of Oklahoma, has been awarded funding from the U.S. National Science Foundation to create training-free detection methods and novel countermeasures to protect sensitive information from emerging wireless eavesdropping techniques.<\/p>\n","protected":false},"author":2,"featured_media":30743,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-30742","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-techbiz"],"featured_image_urls":{"full":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless.webp",768,576,false],"thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-200x200.webp",200,200,true],"medium":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-675x506.webp",675,506,true],"medium_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless.webp",750,563,false],"large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless.webp",750,563,false],"1536x1536":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless.webp",768,576,false],"2048x2048":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless.webp",768,576,false],"ultp_layout_landscape_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless.webp",768,576,false],"ultp_layout_landscape":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-768x570.webp",768,570,true],"ultp_layout_portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-600x576.webp",600,576,true],"ultp_layout_square":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-600x576.webp",600,576,true],"newspaper-x-single-post":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-760x490.webp",760,490,true],"newspaper-x-recent-post-big":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-550x360.webp",550,360,true],"newspaper-x-recent-post-list-image":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-95x65.webp",95,65,true],"web-stories-poster-portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-640x576.webp",640,576,true],"web-stories-publisher-logo":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-96x96.webp",96,96,true],"web-stories-thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/10\/wireless-150x113.webp",150,113,true]},"author_info":{"info":["RevoScience"]},"category_info":"<a href=\"https:\/\/www.revoscience.com\/en\/category\/techbiz\/\" rel=\"category tag\">Tech<\/a>","tag_info":"Tech","comment_count":"0","_links":{"self":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/30742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/comments?post=30742"}],"version-history":[{"count":1,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/30742\/revisions"}],"predecessor-version":[{"id":30744,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/30742\/revisions\/30744"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media\/30743"}],"wp:attachment":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media?parent=30742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/categories?post=30742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/tags?post=30742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}