Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 19-minute conference talk from USENIX WOOT '14 that delves into the use of inaudible sound as a covert channel in mobile devices. Discover how attackers can exploit ultrasonic frequencies and isolated sound produced by device vibrations to bypass information flow control systems and exfiltrate data. Learn about the implementation of an ultrasonic modem for Android, capable of sending signals up to 100 feet away, even when the transmitter is inside a pocket. Examine the potential risks associated with these covert channels and consider proposed solutions to mitigate these vulnerabilities. Gain insights into the importance of regulating sound-based channels to ensure effective information flow control in mobile devices.