Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
Just tweeted(August 14, 2014 at 11:18AM):
Previous research about sensor based attacks on Android platform focused mainly on accessing or controlling over sensitive device components, such as camera, microphone and GPS. These approaches get data from sensors directly and need corresponding sensor invoking permissions. See here
Previous research about sensor based attacks on Android platform focused mainly on accessing or controlling over sensitive device components, such as camera, microphone and GPS. These approaches get data from sensors directly and need corresponding sensor invoking permissions. See here
Comments