We show how a low-power device, such as a surveillance bug, can take advantage of a nearby mobile phone to exfiltrate arbitrary secrets across the Internet at a data rate of hundreds to thousands of bits per second, all without the phone owner’s awareness or permission. All the attack requires is for the phone to browse to an attacker-controlled website. This feat is carried out by exploiting a particular characteristic of the phone’s gyroscope which was discovered by Son et al. in . We discuss the theoretical principles behind our attack, evaluate it on several different mobile devices, and discuss potential countermeasures and mitigations. Finally, we suggest how this attack vector can be used benevolently for the purpose of safer and easier two-factor authentication.
|State||Published - 1 Jan 2016|
|Event||10th USENIX Workshop on Offensive Technologies, WOOT 2016 - Austin, United States|
Duration: 8 Aug 2016 → 9 Aug 2016
|Conference||10th USENIX Workshop on Offensive Technologies, WOOT 2016|
|Period||8/08/16 → 9/08/16|