2021 18th International Conference on Privacy, Security and Trust (PST) 2021
DOI: 10.1109/pst52912.2021.9647842
|View full text |Cite
|
Sign up to set email alerts
|

GAIROSCOPE: Leaking Data from Air-Gapped Computers to Nearby Smartphones using Speakers-to-Gyro Communication

Abstract: It is known that malware can leak data from isolated, air-gapped computers to nearby smartphones using ultrasonic waves. However, this covert channel requires access to the smartphone's microphone, which is highly protected in Android OS and iOS, and might be non-accessible, disabled, or blocked.In this paper we present 'GAIROSCOPE,' an ultrasonic covert channel that doesn't require a microphone on the receiving side. Our malware generates ultrasonic tones in the resonance frequencies of the MEMS gyroscope. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…In addition, gyroscopes can be used to launch keyboard vibration attacks, which can be used to exfiltrate data from air-gapped systems through smartphones. As reported by Guri et al at an international conference on privacy, security, and trust (PST) [134], they have demonstrated a proof of concept in which they show how an attacker can use speakers to launch realtime communication with the gyroscope and exfiltrate sensitive data from an air-gapped system. Furthermore, gyroscopes can be used with speech recognition software to enable eavesdropping when microphones are unavailable [135].…”
Section: Gyroscope Attacksmentioning
confidence: 90%
“…In addition, gyroscopes can be used to launch keyboard vibration attacks, which can be used to exfiltrate data from air-gapped systems through smartphones. As reported by Guri et al at an international conference on privacy, security, and trust (PST) [134], they have demonstrated a proof of concept in which they show how an attacker can use speakers to launch realtime communication with the gyroscope and exfiltrate sensitive data from an air-gapped system. Furthermore, gyroscopes can be used with speech recognition software to enable eavesdropping when microphones are unavailable [135].…”
Section: Gyroscope Attacksmentioning
confidence: 90%
“…Specific attack scenarios have also been the focus of previous investigations, highlighting the potential for hidden voice commands, audio adversarial examples, and covert channels [5,12,15,22,23,26,30,35,39,41,42,45,51,54,55,56,60,61,64,69,73,75]. These studies have examined the feasibility and implications of these attack techniques, aiming to develop effective detection and mitigation strategies.…”
Section: Introductionmentioning
confidence: 99%