Turn Android phones into monitoring tools

Previous experiments have shown that inertial measurement units (IMUs) such as gyroscopes and accelerometers in smartphones can monitor conversations by detecting sound waves. This means that even an application that does not have permission to turn on the microphone can get conversation content through IMU. In order to prevent attackers from obtaining accurate information, Google limited the frequency at which Android apps can sample data from IMU to 200 times per second, making it impossible for attackers to accurately obtain conversation content.

Based on preprints published on the preprint platform arXiv, researchers discovered a loophole-increasing the application’s actual sampling rate from 200 times per second to 400 times per second by deceiving gyroscopes and motion sensors to make measurements slightly offset in time. Using this method, an attacker can repair a greatly increased amount of audio obtained. Compared with just 200 samples per second, their method reduced the word error rate when AI transcribed by 83%. This suggests that current security measures are “not enough to prevent complex eavesdropping attacks” and should be re-evaluated.

Friendly reminder: shutting off the phone may not work, depending on the design of the phone. The current mobile phone design even if you turn off the phone when replacing the battery in an integrated manner, but the mobile phone is not turned off, it is just a deep hibernation. If the design method requires it, positioning and the like can be done completely. The mobile phone screen is not bright, but the background data is running completely at low sleep, that is, gps positioning, camera, recording, etc.

Previous experiments have shown that inertial measurement units (IMUs) such as gyroscopes and accelerometers in smartphones can monitor conversations by detecting sound waves. This means that even an application that does not have permission to turn on the microphone can get conversation content through IMU. In order to prevent attackers from obtaining accurate information, Google limited the frequency at which Android apps can sample data from IMU to 200 times per second, making it impossible for attackers to accurately obtain conversation content. Based on preprints published on the preprint platform arXiv, researchers discovered a loophole-increasing the application’s actual sampling rate from 200 times per second to 400 times per second by deceiving gyroscopes and motion sensors to make measurements slightly offset in time. Using this method, an attacker can repair a greatly increased amount of audio obtained. Compared with just 200 samples per second, their method reduced the word error rate when AI transcribed by 83%. This suggests that current security measures are “not enough to prevent complex eavesdropping attacks” and should be re-evaluated.

The original article was published on Arxiv!
Thank you for watching this video. If you like it, please subscribe and like it. thank

Original Arxiv:https://arxiv.org/abs/2409.16438
https://news.sciencenet.cn/htmlnews/2024/10/531588.shtm

Oil tubing:

Scroll to Top