Music, lighting can be used to trigger mobile malware

Advertisement
By Press Trust of India | Updated: 27 May 2013 14:25 IST
Scientists, including one of Indian-origin, have uncovered new hard-to-detect methods involving music, lighting or vibration that criminals may use to trigger mobile device malware.

Researchers at the University of Alabama at Birmingham (UAB) presented the research at the 8th Association for Computing Machinery (ACM) Symposium on Information, Computer and Communications Security (ASIACCS) in Hangzhou, China.

"When you go to an arena or Starbucks, you don't expect the music to have a hidden message, so this is a big paradigm shift because the public sees only emails and the Internet as vulnerable to malware attacks," said Ragib Hasan, assistant professor of computer and information sciences and director of the UAB SECuRE and Trustworthy (SECRET) computing lab.

"We devote a lot of our efforts towards securing traditional communication channels. But when bad guys use such hidden and unexpected methods to communicate, it is difficult if not impossible to detect that," Hasan said.

Advertisement

A team of UAB researchers was able to trigger malware hidden in mobile devices from 55 feet away in a crowded hallway using music.

Advertisement

They were also successful, at various distances, using music videos; lighting from a television, computer monitor and overhead bulbs; vibrations from a subwoofer; and magnetic fields.

"We showed that these sensory channels can be used to send short messages that may eventually be used to trigger a mass-signal attack," said Nitesh Saxena, director of the UAB Security and Privacy in Emerging computing and networking Systems (SPIES) research group and assistant professor in the Center for Information Assurance and Joint Forensics Research (CIA-JFR).

Advertisement

"While traditional networking communication used to send such triggers can be detected relatively easily, there does not seem to be a good way to detect such covert channels currently," Saxena said.

Researchers were able to trigger malware with a bandwidth of only five bits per second - a fraction of the bandwidth used by laptops or home computers.

Advertisement

"This kind of attack is sophisticated and difficult to build, but it will become increasingly easier to accomplish in the future as technology improves," said Shams Zawoad, a doctoral student and graduate assistant in the SECRET computing lab.

"We need to create defenses before these attacks become widespread, so it is better that we find out these techniques first and stay one step ahead," Zawoad said.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus 15: Everything We Know Ahead of Its Upcoming Launch in China
  1. Global Projects Aim to Save Sinking Cities From Rising Seas and Climate Change
  2. NASA Confirms Brightening Comet SWAN Could Be Visible With Binoculars: When and Where to See It
  3. We Live in Time OTT Release: When, Where to Watch the Andrew Garfield and Florence Pugh Romance
  4. Imbam Is Now Streaming Online: Know Everything About This Deepak Parambol Starrer Malayali Drama
  5. Mysterious Asteroid Impact Found in Australia, But the Crater is Missing
  6. Thanal Comes to OTT: Everything You Need to Know About This Tamil Action Thriller
  7. Madam Sengupta Is Now Streaming: Know Where to Watch This Bangla Crime Thriller
  8. Ryugu Samples Reveal Ancient Water Flow on Asteroid for a Billion Years
  9. Scientists Create Most Detailed Radio Map of Early Universe Using MWA
  10. Mayor of Kingstown Season 4 OTT Release: Know When, Where to Watch Jeremy Renner's Crime Drama
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.