首页> 外文OA文献 >Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
【2h】

Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone

机译:你的语音助手是我的:如何滥用演讲者来窃取信息   并控制你的手机

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Previous research about sensor based attacks on Android platform focusedmainly on accessing or controlling over sensitive device components, such ascamera, microphone and GPS. These approaches get data from sensors directly andneed corresponding sensor invoking permissions. This paper presents a novel approach (GVS-Attack) to launch permissionbypassing attacks from a zero permission Android application (VoicEmployer)through the speaker. The idea of GVS-Attack utilizes an Android system built-invoice assistant module -- Google Voice Search. Through Android Intentmechanism, VoicEmployer triggers Google Voice Search to the foreground, andthen plays prepared audio files (like "call number 1234 5678") in thebackground. Google Voice Search can recognize this voice command and executecorresponding operations. With ingenious designs, our GVS-Attack can forgeSMS/Email, access privacy information, transmit sensitive data and achieveremote control without any permission. Also we found a vulnerability of status checking in Google Search app, whichcan be utilized by GVS-Attack to dial arbitrary numbers even when the phone issecurely locked with password. A prototype of VoicEmployer has been implementedto demonstrate the feasibility of GVS-Attack in real world. In theory, nearlyall Android devices equipped with Google Services Framework can be affected byGVS-Attack. This study may inspire application developers and researchersrethink that zero permission doesn't mean safety and the speaker can be treatedas a new attack surface.
机译:以前有关Android平台上基于传感器的攻击的研究主要集中在访问或控制敏感设备组件(如相机,麦克风和GPS)上。这些方法直接从传感器获取数据,并且需要相应的传感器调用权限。本文提出了一种新颖的方法(GVS-Attack),该方法通过绕过扬声器的零权限Android应用程序(VoicEmployer)的攻击来启动权限。 GVS-Attack的想法利用了Android系统内置的发票辅助模块-Google语音搜索。通过Android Intent机制,VoicEmployer将Google语音搜索触发到前台,然后在后台播放准备好的音频文件(例如“呼叫号码1234 5678”)。 Google语音搜索可以识别此语音命令并执行相应的操作。凭借精巧的设计,我们的GVS-Attack可以伪造SMS /电子邮件,访问隐私信息,传输敏感数据并无需任何许可即可实现远程控制。此外,我们还在Google搜索应用中发现了状态检查漏洞,即使手机已用密码安全锁定,GVS-Attack仍可利用该漏洞拨打任意号码。已实现VoicEmployer的原型,以演示GVS-Attack在现实世界中的可行性。从理论上讲,几乎所有配备Google Services Framework的Android设备都可能受到GVS-Attack的影响。这项研究可能会激发应用程序开发人员和研究人员重新思考零许可并不意味着安全,可以将说话者视为新的攻击面。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号