EarSpy Attack: Motion Data Sensors Used to Pry on Android Devices

A team of researchers has created an eavesdropping attack for Android devices that, to varying degrees, can identify the gender and identity of the caller and even decipher private speech. 

EarSpy Attack 

The side-channel attack, EarSpy, opens up new possibilities of eavesdropping via motion sensor data readings produced by reverberations from ear speakers in mobile devices. The attack was initially established in smartphone loudspeakers, since ear speakers were comparatively weak, to produce adequate vibrations for eavesdropping. 

However, today’s smartphones include stereo speakers that are more potent, providing far higher sound quality and stronger vibrations. 

The Experiment 

EarSpy is an experiment conducted by a team of researchers from universities like Rutgers University, Texas A&M University, Temple University, New Jersey Institute of Technology, and the University of Dayton. 

  • The researchers utilized the OnePlus 7T and OnePlus 9 devices along with varying sets of pre-recorded audio that was exclusive via the ear speakers of the two devices.  
  • During a simulated call, a third-party app named Physics Toolbox Sensor Suite was used in order to capture accelerometer data. 
  • They then analyzed the audio stream using MATLAB to extract characteristics. 

The res

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: