Inaudible Sound as a Covert Channel in Mobile Devices

@inproceedings{Deshotels2014InaudibleSA,
  title={Inaudible Sound as a Covert Channel in Mobile Devices},
  author={Luke Deshotels},
  booktitle={WOOT},
  year={2014}
}
Mobile devices can be protected by a variety of information flow control systems. These systems can prevent Trojans from leaking secrets over network connections. As mobile devices become more secure, attackers will begin to use unconventional methods for exfiltrating data. We propose two sound-based covert channels, ultrasonic and isolated sound. Speakers on mobile devices can produce frequencies too high for most humans to hear. This ultrasonic sound can be received by a microphone on the… CONTINUE READING
Highly Cited
This paper has 51 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 35 extracted citations

Detection of Intrusions and Malware, and Vulnerability Assessment

Lecture Notes in Computer Science • 2017
View 7 Excerpts
Highly Influenced

Xerox Day Vulnerability

IEEE Transactions on Information Forensics and Security • 2019
View 8 Excerpts
Highly Influenced

An Overview of Android Covert Channel

2018 2nd IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC) • 2018
View 1 Excerpt

Construction and Mitigation of User-Behavior-Based Covert Channels on Smartphones

IEEE Transactions on Mobile Computing • 2018
View 3 Excerpts

51 Citations

0102020152016201720182019
Citations per Year
Semantic Scholar estimates that this publication has 51 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 17 references

A programmable interface for extending android security

A. N ADKARNI
Technical Report TUD - CS - • 2014

Preventing accidental data disclosure in modern operating systems

ACM Conference on Computer and Communications Security • 2013
View 1 Excerpt

Underwater Acoustic Networking Techniques

Springer Briefs in Electrical and Computer Engineering • 2012
View 1 Excerpt

A stealthy and context - aware sound trojan for smartphones

R. S CHLEGEL, K. Z HANG, +5 authors X. Soundcomber
2011

Similar Papers

Loading similar papers…