Android Century
  • Home
  • Android Zone
    • Android Apps
    • Android Games
    • Apps APk Files
    • Games Apk Files
    • Apps Hack Tricks
  • Reviews
  • Fantasy Zone
    • Entertainment
    • Quotes and Status
    • Life Style
    • Home Made Tips
    • Hair Care
    • Skin Care
    • Fantasy Tips
  • Tricks
    • Free Recharge
    • Free Internet
    • shopping Cashback
    • Recharge Cashback
  • Tech
  • Mobiles
  • Gadgets
  • News
  • How To's
  • Software
Breaking
Loading...

Featured post

How to Take Great Photos With Apple's iPhone X

Recent Posts

Labels

  • Android Apk Files
  • Android Apps
  • Android Games
  • Apps Apk Files
  • Entertainment
  • Fantasy Tips
  • Gadgets
  • Hair Care
  • HomeMade Tips
  • How To's
  • News
  • Quotes
  • Quotes & Status
  • Recharge Cashback
  • Recharge Promo Codes
  • Shopping Cashback
  • Technology
  • skin care
Home / How To's / How to hack a phone with sound waves

How to hack a phone with sound waves

Latest Govt. Jobs 23:22:00 How To's Edit
A security loophole that would allow someone to add extra steps to the counter on your Fitbit monitor might seem harmless. But researchers say it points to the broader risks that come with technology’s embedding into the nooks of our lives.

On Tuesday, a group of computer security researchers at the University of Michigan and the University of South Carolina will demonstrate that they have found a vulnerability that allows them to take control of or surreptitiously influence devices through the tiny accelerometers that are standard components in consumer products like smartphones, fitness monitors and even automobiles.

In their paper, the researchers describe how they added fake steps to a Fitbit fitness monitor and played a “malicious” music file from the speaker of a smartphone to control the phone’s accelerometer. That allowed them to interfere with software that relies on the smartphone, like an app used to pilot a radio-controlled toy car.

“It’s like the opera singer who hits the note to break a wine glass, only in our case, we can spell out words” and enter commands rather than just shut down the phone, said Kevin Fu, an author of the paper, who is also an associate professor of electrical engineering and computer science at the University of Michigan and the chief executive of Virta Labs, a company that focuses on cybersecurity in health care. “You can think of it as a musical virus.”

The flaw, which the researchers found in more than half of the 20 commercial brands from five chip makers they tested, illustrates the security challenges that have emerged as robots and other kinds of digital appliances have begun to move around in the world.

With dozens of start-ups and large transportation companies pushing to develop self-driving cars and trucks, undetected vulnerabilities that might allow an attacker to remotely control vehicles are an unnerving possibility.

Still, computer security researchers said the discovery was not a sky-is-falling bug but rather a revealing window into the cybersecurity challenges inherent in complex systems in which analog and digital components can interact in unexpected ways.

“The whole world of security is about unintended interactions,” said Paul Kocher, a cryptographer and a former executive at the chip company Rambus.

Accelerometers are instruments that measure acceleration and are frequently manufactured as silicon chip-based devices known as microelectromechanical systems, or MEMS. Accelerometers are used for navigating, for determining the orientation of a tablet computer and for measuring distance traveled in fitness monitors such as Fitbits.

How to hack a phone with sound waves

In the case of the toy car, the researchers did not actually compromise the car’s microprocessor, but they controlled the car by forcing the accelerometer to produce false readings. They exploited the fact that a smartphone application relies on the accelerometer to control the car.

While toy cars might seem like trivial examples, there are other, darker possibilities. If an accelerometer was designed to control the automation of insulin dosage in a diabetic patient, for example, that might make it possible to tamper with the system that controlled the correct dosage.

Dr. Fu has researched the cybersecurity risks of medical devices, including a demonstration of the potential to wirelessly introduce fatal heart rhythms into a pacemaker.

He said the current research was inspired by a discussion in his group about a previous study in which drones were disabled with music. He added that earlier research demonstrated denial-of-service attacks that used sound to disable accelerometers.

In 2014, security researchers at Stanford University demonstrated how an accelerometer could be used surreptitiously as a rudimentary microphone, for example. And in 2011, a group from the Massachusetts Institute of Technology and the Georgia Institute of Technology demonstrated the use of an accelerometer in a smartphone to decode roughly 80 percent of the words being typed on a nearby computer keyboard by capturing vibrations from the keyboard.

In the case of the research by the University of Michigan and the University of South Carolina, scientists stopped the accelerometer from functioning and changed its behavior.

In testing 20 accelerometer models from five manufacturers, they affected the information or output from 75 percent of the devices tested and controlled the output in 65 percent of the devices.

The Department of Homeland Security was expected to issue a security advisory alert Tuesday for chips produced by the semiconductor companies documented in the paper, Dr. Fu said. The five chip makers were Analog Devices, Bosch, InvenSense, Murata Manufacturing and STMicroelectronics.

The paper, which will be presented at the IEEE European Symposium on Security and Privacy in Paris next month, also documents hardware and software changes manufacturers could make to protect against the flaws the researchers discovered.
Share on Facebook Share on Twitter Share on Google Plus

RELATED POSTS


How To Get Free Recharge And Money ...

How to Sync Your Contacts Between A...

How to Know a Wi-Fi Network Is Fast...
How to hack a phone with sound waves How to hack a phone with sound waves Reviewed by Latest Govt. Jobs on 23:22:00 Rating: 5

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments ( Atom )

Search This Blog

TEST BOOK FOR GOVT ENTRANCE TEST

TEST BOOK FOR GOVT ENTRANCE TEST
Find All Latest book for preparation of SSC,RAILWAYBANK PO,RBI,BANK CLERK,GATE ME,GATE CE are available here in less prices, to check out the books click here

Translate

  • Popular Post
  • Random posts
  • Category

Popular Posts

  • Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Refer & Earn Offer:  Hey Guys! Today I make an article about Teen Patti Referral ...
  • Hands-on with the home windows 10 Creators update for the Xbox One: Beam recreation streaming arrives
    The Windows 10 Creators Update is here, now—yes,  now —but not (officially) on the PC. The ...
  • Taotronics TT-BH22 Headphones Review
    We make it a addiction to now not look up pricing of a product sooner than reviewing and if ...
  • Pentagon strongly condemns North Korea missile test
    The Pentagon on Monday strongly condemned North Korea’s latest missile test, adding that the ...
  • Bank wallets growing faster than e-wallets
    In the  bank  versus  e-wallets  sweepstakes,  lenders  have now gained lost ground. As of ...
  • Reliance Jio to offer sharp tariff discounts for customers signing up by March-end
    Reliance Industries' Jio unit will charge a tariff for its services from April, but will offer ...

Random Posts

  • Honor 6X review: a lot of phone for the money, shame about the old software
    Honor 6X review: a lot of phone for the money, shame about the old software
    14.02.2017 - 0 Comments
    Huawei’s Honor line has been making a name for itself by selling good yet reasonably priced smartphones.…
  • 11.02.2016 - 0 Comments
  • Nexus 5 Review: Still A Viable Option In 2017?
    Nexus 5 Review: Still A Viable Option In 2017?
    11.02.2017 - 0 Comments
    Google has pulled the Nexus 5 from Google Play, meaning if you still want to pick one up you're going to…
  • How to protect smartphones from theft or loss [Go Android Authority]
    How to protect smartphones from theft or loss [Go Android Authority]
    21.03.2016 - 0 Comments
    How to protect smartphones from theft or loss: Theft or loss of smart phones is definitely one’s worst…
  • 7 Shower Tricks To Keep Your Hair Healthy
    7 Shower Tricks To Keep Your Hair Healthy
    08.03.2016 - 0 Comments
    Do you always have a bad hair day when you shower? Just can’t get those long tresses to lie flat, can you?…

Labels

Android Apk Files Android Apps Android Games Apps Apk Files Apps Hack Tricks Entertainment Free Internet Freecharge Gadgets Games Apk Files How To's Laptops Guide Mobiles Reviews Technology Viral's android zone free recharge

Entertainment

Tricks

Popular Posts

  • Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Refer & ...
  • Hands-on with the home windows 10 Creators update for the Xbox One: Beam recreation streaming arrives
    The Windows ...
  • Meet Bat Bot, the new flying batlike drone
    Holy drone ...
  • Lenovo Yoga Book launched in India at Rs 49,990: First Impressions
    Lenovo  has ...
  • Donald Trump presidency gets social with detailed posts, photos
    US President ...
  • Jio effect: Telcos may have to cut data rates 2017
    India's big  ...
  • Grow Hair Faster: How to Make Hair Grow Faster Naturally
    Every woman wants ...

Random Posts

  • How to Get Rid of McAfee’s Notifications and Bundled Software
    How to Get Rid of McAfee’s Notifications and Bundled Software
    11.02.2017 - 0 Comments
    McAfee, like most other modern antivirus programs, doesn’t stay out of your way. It installs browser…
  • How to Block Someone on Instagram
    How to Block Someone on Instagram
    11.02.2017 - 0 Comments
    Instagram is pretty decent as social networks go, but there is still the occasional troll or spam bot.…
  • Samsung Trademarks Galaxy S8
    Samsung Trademarks Galaxy S8 "Infinity Display"
    05.03.2017 - 0 Comments
    Samsung has filed a trademark for the "Infinity Display" which may be coming to the Galaxy S8…
  • How to Spot (and Avoid) Fake Android Apps in the Play Store
    How to Spot (and Avoid) Fake Android Apps in the Play Store
    19.02.2018 - 0 Comments
    Fake Android apps in the Play Store are a problem. People create listings designed to look exactly like…
  • What Are Instagram’s “Stories”, and How  I Use Them?
    What Are Instagram’s “Stories”, and How I Use Them?
    18.02.2017 - 0 Comments
    Instagram has taken a leaf out of Snapchat’s book and added a disappearing Story feature. Now, as well as…

Most Popular

  • Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Refer & ...
  • SAMSUNG GALAXY J7 (2016) REVIEWS
    SAMSUNG GALAXY J7 (2016) REVIEWS
    SAMSUNG GALAXY J ...
  • Top 5 Best SmartPhones under 7000 Rs (March 2017)
    Looking for the ...
  • Apple, IBM, Cisco are huge because of Indians, do not deny them H-1B visa: RBI Governor Urjit Patel
    ...
  • SAMSUNG GALAXY J7 (2016) Specifications
    SAMSUNG GALAXY J ...
  • BlackBerry Teases Marshmallow Beta Testing for Priv by Next Week
    Blackberry ...
  • LG Q6 Review
    LG Q6 Review
    2017 is ...

Contact Form

Name

Email *

Message *

Offers Zone

Created By Android Century Distributed by Android Century
  • Home
  • About us
  • Contact us
  • Privacy policy
  • Terms of use
  • Advertise here
Subscribe Via Email Subscribe To Android Century By Email And Get Free Updates. ;-)


Your email address is safe with us!