Download now Free registration required
The authors explore the threat of Smartphone malware with access to on-board sensors, which open new avenues for illicit collection of private information. While existing work shows that such "Sensory malware" can convey raw sensor data (e.g., video and audio) to a remote server, these approaches lack stealthiness, incur significant communication and computation overhead during data transmission and processing, and can easily be defeated by existing protections like denying installation of applications with access to both sensitive sensors and the network. They present Soundcomber, a Trojan with few and innocuous permissions, that can extract a small amount of targeted private information from the audio sensor of the phone.
- Format: PDF
- Size: 261.25 KB