Music, lighting can be used to trigger mobile malware

Advertisement
By Press Trust of India | Updated: 27 May 2013 14:25 IST
Scientists, including one of Indian-origin, have uncovered new hard-to-detect methods involving music, lighting or vibration that criminals may use to trigger mobile device malware.

Researchers at the University of Alabama at Birmingham (UAB) presented the research at the 8th Association for Computing Machinery (ACM) Symposium on Information, Computer and Communications Security (ASIACCS) in Hangzhou, China.

"When you go to an arena or Starbucks, you don't expect the music to have a hidden message, so this is a big paradigm shift because the public sees only emails and the Internet as vulnerable to malware attacks," said Ragib Hasan, assistant professor of computer and information sciences and director of the UAB SECuRE and Trustworthy (SECRET) computing lab.

Advertisement

"We devote a lot of our efforts towards securing traditional communication channels. But when bad guys use such hidden and unexpected methods to communicate, it is difficult if not impossible to detect that," Hasan said.

A team of UAB researchers was able to trigger malware hidden in mobile devices from 55 feet away in a crowded hallway using music.

Advertisement

They were also successful, at various distances, using music videos; lighting from a television, computer monitor and overhead bulbs; vibrations from a subwoofer; and magnetic fields.

"We showed that these sensory channels can be used to send short messages that may eventually be used to trigger a mass-signal attack," said Nitesh Saxena, director of the UAB Security and Privacy in Emerging computing and networking Systems (SPIES) research group and assistant professor in the Center for Information Assurance and Joint Forensics Research (CIA-JFR).

Advertisement

"While traditional networking communication used to send such triggers can be detected relatively easily, there does not seem to be a good way to detect such covert channels currently," Saxena said.

Researchers were able to trigger malware with a bandwidth of only five bits per second - a fraction of the bandwidth used by laptops or home computers.

Advertisement

"This kind of attack is sophisticated and difficult to build, but it will become increasingly easier to accomplish in the future as technology improves," said Shams Zawoad, a doctoral student and graduate assistant in the SECRET computing lab.

"We need to create defenses before these attacks become widespread, so it is better that we find out these techniques first and stay one step ahead," Zawoad said.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Ustaad Bhagat Singh OTT Release, Plot, Cast & Review: All You Need to Know
  1. Small NASA Satellite Could Reveal How Lightning Impacts Space Weather
  2. Piece by Piece: Pharrell Williams’ LEGO Documentary Now Streaming on Netflix
  3. Ustaad Bhagat Singh OTT Release: When & Where to Watch Pawan Kalyan’s Telugu Film Online
  4. Battleground Season 2 Now on OTT: Know Where to Watch This Ultimate Fitness Reality Show Online
  5. Apne Paraye Out on OTT: Know Where to Watch This Hindi Dub of Bengali Drama Series
  6. Scientists Just Created the Largest 3D Map of the Universe Ever to Study Dark Energy
  7. Honor 600 Pro and Honor 600 Key Specifications, Features Revealed via Official Listing
  8. Ethereum NFT Platform Shuts Down After Blacklove Sale Falls Through
  9. Vivo X300 FE Storage Options Leaked Alongside Live Image With Telephoto Extender Kit
  10. Indian Smartphone Shipments Dropped to Six-Year Low in Q1 2026 as Vivo Topped Market, Nothing Led Growth: Counterpoint
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.