Category: IT|Jul 8, 2018 | Author: Admin

The mobile battery can reveal what you do on your smartphone

Share on

Researchers demonstrated a unique attack method.

A group of researchers at the University of Texas, the Hebrew University of Jerusalem and the Israel Institute of Technology show in a research paper that attackers can utilize the mobile battery to utilize a smartphone.

Researchers demonstrated a unique attack method.

A group of researchers at the University of Texas, the Hebrew University of Jerusalem and the Israel Institute of Technology show in a research paper that attackers can utilize the mobile battery to utilize a smartphone.

Attacks through the battery
According to the group, an infected battery can collect enough battery usage information that can reveal how the owner uses the device, thus linking power streams to keystrokes, the context in which it occurs and what happened in advance or after printing. For example, a malicious battery may detect that the user visits a particular webpage and the attacker can exploit this.

"Together, these sections of information build a coherent image of the user's activity, which dramatically enhances the possibility of individual attacks", writes the group about the disclosures.

The research group demonstrated the method of implanting a microcontroller in the battery to monitor the battery power in and out at 1 kHz, to associate it with various actions on the smartphone.

Fortunately, it does not appear that one has to worry about such attacks with the first one. The solution has only been tested under controlled conditions and is currently difficult to exploit.

Sponsored Ads:

Comments:


Slack.jpg

Slack begins rolling out video and audio message ‘clips’

Category: General|Sep 22, 2021 | Author: Admin
roku.webp

Roku's free OS 10.5 lets you dictate passwords, fixes pesky sound lags on headphones

Category: IT|Sep 21, 2021 | Author: Admin
Apple.webp

Some good news and some strange news from Apple

Category: Apple|Sep 20, 2021 | Author: Admin
broken-windows-header.jpg

New Windows security updates break network printing

Category: Microsoft|Sep 19, 2021 | Author: Admin
Project-Taara-1155x770.webp

Sent 700tb over 4 km of laser technology

Category: IT|Sep 18, 2021 | Author: Admin
Fiber.jpg

'Massive' transatlantic data cable landed on beach in Bude

Category: Google|Sep 17, 2021 | Author: Admin
Discord.png

YouTube shuts down Discord music bot ‘Rythm’

Category: Google|Sep 16, 2021 | Author: Admin
Facebook.webp

Facebook's secret rules differentiate between the "elite" and most people

Category: General|Sep 15, 2021 | Author: Admin
Apple.webp

Apple suddenly had to crisis-update the iPhone and Mac

Category: Apple|Sep 14, 2021 | Author: Admin
Epic.webp

Epic is blocked forever on all Apple platforms

Category: Apple|Sep 13, 2021 | Author: Admin
Desktop-Screenshot.png

NVIDIA To Launch GeForce RTX 30 SUPER ‘Ampere Refresh’ In January 2022, GeForce RTX 40 ‘Ada Lovelace’ GPUs in October 2022

Category: General|Sep 12, 2021 | Author: Admin
chrome-os-secret-weapon-100856418-large.jpg

3 smart shortcuts for a curiously hidden Chrome OS command

Category: Google|Sep 11, 2021 | Author: Admin
sunset-gold-iphone-13-render.png

iPhone 13 unveiled in Ukraine

Category: Apple|Sep 10, 2021 | Author: Admin
iCloud.jpg

Apple brings iCloud passwords to Windows, Microsoft's Edge

Category: Apple|Sep 9, 2021 | Author: Admin
AI.webp

AI will determine if you are allowed to drive

Category: General|Sep 8, 2021 | Author: Admin
more