Inaudible Sound as a Covert Channel in Mobile Devices
Offered By: USENIX via YouTube
Course Description
Overview
Explore a 19-minute conference talk from USENIX WOOT '14 that delves into the use of inaudible sound as a covert channel in mobile devices. Discover how attackers can exploit ultrasonic frequencies and isolated sound produced by device vibrations to bypass information flow control systems and exfiltrate data. Learn about the implementation of an ultrasonic modem for Android, capable of sending signals up to 100 feet away, even when the transmitter is inside a pocket. Examine the potential risks associated with these covert channels and consider proposed solutions to mitigate these vulnerabilities. Gain insights into the importance of regulating sound-based channels to ensure effective information flow control in mobile devices.
Syllabus
WOOT '14 - Inaudible Sound as a Covert Channel in Mobile Devices
Taught by
USENIX
Related Courses
AFL++ - Combining Incremental Steps of Fuzzing ResearchUSENIX via YouTube Unearthing the TrustedCore - A Critical Review on Huawei’s Trusted Execution Environment
USENIX via YouTube Cloning Credit Cards - A Combined Pre-play and Downgrade Attack on EMV Contactless
USENIX via YouTube Tick Tock - Building Browser Red Pills from Timing Side Channels
USENIX via YouTube Zippier ZMap - Internet-Wide Scanning at 10 Gbps
USENIX via YouTube