Inaudible Sound as a Covert Channel in Mobile Devices
Offered By: USENIX via YouTube
Course Description
Overview
Explore a 19-minute conference talk from USENIX WOOT '14 that delves into the use of inaudible sound as a covert channel in mobile devices. Discover how attackers can exploit ultrasonic frequencies and isolated sound produced by device vibrations to bypass information flow control systems and exfiltrate data. Learn about the implementation of an ultrasonic modem for Android, capable of sending signals up to 100 feet away, even when the transmitter is inside a pocket. Examine the potential risks associated with these covert channels and consider proposed solutions to mitigate these vulnerabilities. Gain insights into the importance of regulating sound-based channels to ensure effective information flow control in mobile devices.
Syllabus
WOOT '14 - Inaudible Sound as a Covert Channel in Mobile Devices
Taught by
USENIX
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network