IEMI Threats for Information Security: Remote Command Injection on Modern Smartphones

@article{Kasmi2015IEMITF,
  title={IEMI Threats for Information Security: Remote Command Injection on Modern Smartphones},
  author={C. Kasmi and Jose Lopes Esteves},
  journal={IEEE Transactions on Electromagnetic Compatibility},
  year={2015},
  volume={57},
  pages={1752-1755}
}
Numerous papers dealing with the analysis of electromagnetic attacks against critical electronic devices have been made publicly available. In this paper, we exploit the principle of front-door coupling on smartphones headphone cables with specific electromagnetic waveforms. We present a smart use of intentional electromagnetic interference, resulting in finer impacts on an information system than a classical denial of service effect. As an outcome, we introduce a new silent remote voice… Expand
52 Citations

Figures from this paper

Remote and Silent Voice Command Injection on a Smartphone through Conducted IEMI Threats of Smart IEMI for Information Security
  • 4
  • Highly Influenced
  • PDF
Introduction to Electromagnetic Information Security
  • 3
SCREAM: Sensory Channel Remote Execution Attack Methods
  • 2
  • Highly Influenced
  • PDF
Wearable Technology Brings Security to Alexa and Siri
BadVoice: Soundless voice-control replay attack on modern smartphones
  • 13
  • Highly Influenced
Electromagnetic Watermarking: exploiting IEMI effects for forensic tracking of UAVs
  • J. Esteves
  • Computer Science
  • 2019 International Symposium on Electromagnetic Compatibility - EMC EUROPE
  • 2019
  • 1
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo
  • 12
An Overview of Vulnerabilities of Voice Controlled Systems
  • 18
  • Highly Influenced
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 13 REFERENCES
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
  • 101
  • PDF
Intentional electromagnetic interference for fault analysis on AES block cipher IC
  • 7
Event Logs Generated by an Operating System Running on a COTS Computer During IEMI Exposure
  • 7
Fault Attacks on AES with Faulty Ciphertexts Only
  • 98
  • PDF
High Power Microwave effects on computer networks
  • L. Palisek, L. Suchy
  • Engineering
  • 10th International Symposium on Electromagnetic Compatibility
  • 2011
  • 19
  • Highly Influential
Proximity-based access control for implantable medical devices
  • 184
  • PDF
Susceptibility of electronic systems to high-power microwaves: summary of test experience
  • 192
Classification of electromagnetic effects at system level
  • F. Sabath
  • Engineering
  • 2008 International Symposium on Electromagnetic Compatibility - EMC Europe
  • 2008
  • 46
Apple admits Siri voice data is being shared with third parties
  • 2015
...
1
2
...