Inaudible Sound as a Covert Channel in Mobile Devices
@inproceedings{Deshotels2014InaudibleSA, title={Inaudible Sound as a Covert Channel in Mobile Devices}, author={Luke Deshotels}, booktitle={Workshop on Offensive Technologies}, year={2014} }
Mobile devices can be protected by a variety of information flow control systems. These systems can prevent Trojans from leaking secrets over network connections. As mobile devices become more secure, attackers will begin to use unconventional methods for exfiltrating data.
We propose two sound-based covert channels, ultrasonic and isolated sound. Speakers on mobile devices can produce frequencies too high for most humans to hear. This ultrasonic sound can be received by a microphone on the…
110 Citations
NICScatter: Backscatter as a Covert Channel in Mobile Devices
- Computer ScienceMobiCom
- 2017
A covert channel threat on existing mobile systems that allows the malware to stealthily pass sensitive data to an attacker's nearby mobile device, which can then decode the signal and thus effectively gather the guarded data.
NICSca er: Backsca er as a Covert Channel in Mobile Devices
- Computer Science
- 2017
A covert channel threat on existing mobile systems is discussed, which allows the malware to stealthily pass sensitive data to an attacker’s nearby mobile device, which can then decode the signal and thus gather the guarded data.
Privacy Breach in Android Smartphone Through Inaudible Sound
- Computer Science2022 IEEE Wireless Communications and Networking Conference (WCNC)
- 2022
A dynamic vocabulary selection strategy to facilitate faster data transmission in ultrasonic side-channel attacks and a novel piecewise linear amplitude reduction technique that helps the system to achieve a higher bit-rate and higher amplitude for a long time are proposed.
Exfiltrating data from air-gapped computers via ViBrAtIoNs
- Computer ScienceFuture Gener. Comput. Syst.
- 2021
Zero-permission acoustic cross-device tracking
- Computer Science2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
- 2018
A novel approach to acoustic cross-device tracking is introduced, which does not require microphone access, but instead exploits the susceptibility of MEMS gyroscopes to acoustic vibrations at specific (ultrasonic) frequencies.
Using Inaudible Audio and Voice Assistants to Transmit Sensitive Data over Telephony
- Computer ScienceArXiv
- 2020
The results show that voice assistants in the vicinity of computers can pose new threats to data stored on such computers, which are not addressed by traditional host and network defenses.
GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby Gyroscopes
- Computer ScienceArXiv
- 2022
The experiments show that attackers can exfiltrate sensitive information from air-gapped computers to smartphones located a few meters away via Speakers-to-Gyroscope covert channel via GAIROSCOPE, an ultrasonic covert channel that doesn’t require a microphone on the receiving side.
Privacy Threats through Ultrasonic Side Channels on Mobile Devices
- Computer Science2017 IEEE European Symposium on Security and Privacy (EuroS&P)
- 2017
The capabilities, the current prevalence and technical limitations of this new tracking technique based on three commercial tracking solutions are explored, and detection approaches for ultrasonic beacons and Android applications capable of processing these are developed.
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2020
The developed malware can exploit the computer power supply unit (PSU) to play sounds and use it as an out-of-band, secondary speaker with limited capabilities, and the POWER-SUPPLaY code can operate from an ordinary user-mode process and doesn't need any hardware access or special privileges.
BAT: real-time inaudible sound capture with smartphones
- Computer ScienceMultimedia Tools and Applications
- 2021
BAT, a novel real-time bidirectional communication system using inaudible frequencies that enables unobtrusive speaker-microphone data communication without affecting the primary audio-hearing experience of users is proposed.
References
SHOWING 1-10 OF 18 REFERENCES
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
- Computer ScienceNDSS
- 2011
This work presents Soundcomber, a Trojan with few and innocuous permissions, that can extract a small amount of targeted private information from the audio sensor of the phone, and performs efficient, stealthy local extraction, thereby greatly reducing the communication cost for delivering stolen data.
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones
- Computer ScienceNDSS
- 2013
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain…
Examining the characteristics and implications of sensor side channels
- Computer Science2013 IEEE International Conference on Communications (ICC)
- 2013
The ultimate goal of this work is to illustrate the need for intrusion detection systems (IDSs) that not only monitor the RF channel, but also monitor the values returned by the sensory components.
Tapprints: your finger taps have fingerprints
- Computer ScienceMobiSys '12
- 2012
The location of screen taps on modern smartphones and tablets can be identified from accelerometer and gyroscope readings, and TapPrints, a framework for inferring the location of taps on mobile device touch-screens using motion sensor data combined with machine learning analysis is presented.
On Covert Acoustical Mesh Networks in Air
- Computer Science, PhysicsJ. Commun.
- 2013
It is shown that the concept of a covert acoustical mesh network renders many conventional security concepts useless, as acoustICAL communications are usually not considered.
Mitigating Android Software Misuse Before It Happens
- Computer Science
- 2008
The Kirin security framework is developed to enforce policy that transcends applications, called policy invariants, and provides an “at installation” self-certification process to ensure only policy compliant applications will be installed.
ASM: A Programmable Interface for Extending Android Security
- Computer ScienceUSENIX Security Symposium
- 2014
The Android Security Modules (ASM) framework is proposed, which provides a programmable interface for defining new reference monitors for Android and envision ASM enabling in-the-field security enhancement of Android devices without requiring root access, a significant limitation of existing bring-your-own-device solutions.
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
- Computer ScienceOSDI
- 2010
Using TaintDroid to monitor the behavior of 30 popular third-party Android applications, this work found 68 instances of misappropriation of users' location and device identification information across 20 applications.
Preventing accidental data disclosure in modern operating systems
- Computer ScienceCCS
- 2013
In Aquifer, application developers define secrecy restrictions that protect the entire user interface workflow defining the user task and allows applications to retain control of data even after it is shared.
MockDroid: trading privacy for application functionality on smartphones
- Computer ScienceHotMobile '11
- 2011
MockDroid allows users to revoke access to particular resources at run-time, encouraging users to consider the trade-off between functionality and the disclosure of personal information whilst they use an application.