Secret chips can be hidden in the device to spy on and hijack smartphones
At a recent security conference, experts from Israeli universities presented new research describing the scenario in which attacks could be carried out through replacement parts to contain broken parts. (spare part) on the phone and other smart devices.
The form of attack - described as an intermediate chip - is based on the assumption that a third party produces excess replacements in large numbers containing additional chips to interfere with internal communication. set of devices, and still capable of executing poisoning commands.
An attacker can hide the infected chip on the replacement part of the phone
Researchers demonstrate their hypothesis by creating a poisoning replacement and using them to gain control of a test phone.
Although the attack looks complicated, the researchers say these available electronic devices cost only about $ 10. There must be certain skills with electronic devices, but to perform the attack is not as complicated as many people think.
Two ways to attack through replacement parts on the device
When creating toxic replacements, the researchers discovered two ways to perform this type of attack.
- The first way is to insert the basic command into the communication between the device and the replacement parts. This works best with touch screens because it allows an attacker to impersonate a user by mimicking touch gestures, thereby stealing information.
- The second way is to attack the buffer overflow type in the vulnerability of the touch device driver inside the operating system kernel. The attacker exploits this error to hijack the device and perform an attack on the OS without mimicking the touch operation. The second type of attack is suitable for some device drivers but not for all.
The team - which includes experts from Ben-Gurion University of the Negev, Israel - offers a variety of ways to prevent attacks by replacing hardware with their research reports. These methods can be found on the report 'Shattered Trust: When Replacement Smartphone Components' at the following addresses https://iss.oy.ne.ro/Shattered.pdf and https: // www .usenix.org / system / files / conference / woot17 / woot17-paper-shwartz.pdf . These researchers presented their results at the WooT '17 USENIX conference. The videos below describe the process by which the group performs the attack through the intermediate chip on the phone that contains the infected replacement.
You should read it
- Phone battery tips
- Invite to admire the unexpected beauty of the phone, the computer when it is broken into pieces
- Learn about Nothing Phone 1: A phone with a unique design
- How to save a phone or tablet that has fallen into water
- Invincible Windows Phone
- Should I upgrade RAM for my phone?
- Why does restarting the phone help the device run faster and fix some common errors?
- How to fix the speaker in the phone is not heard
May be interested
- Compare the size of high-end chips from Qualcomm, Samsung, Huawei and Applequalcomm snapdragon, samsung exynos, huawei kirin and apple a-series are the four leading flagship chip makers for mobile devices in the smartphone market. of these 4, there are 3 firms integrated for android flagship smartphones, and a-series chips, apple only put them on their own devices.
- 10 super useful new features of smartphones that few people knowplease refer to the 10 new super useful features of smartphones that few people know in the article below!
- 11 mysterious places are blurred on Google Maps, what is being hidden?there are some secret locations that are obscured or blacked out on google maps. even if you zoom in all the way, you can't see it, so you can only curiously predict.
- How to remove viruses hidden on USBhow to remove viruses hidden on usb. because usb is a mobile device, we often plug in many different computers. that makes usb very susceptible to virus infection. sometimes due to viruses, your important files in usb are hidden, although in reality they may still exist intact. in this article, we will discuss how to remove hidden files on usb flash drives.
- Pictures bring hidden messages on the blogsometimes, when visiting a friend's blog, people see empty pictures or cliché words that do not match the content of the article. simply because the message in the picture has been hidden and the secret is only for one person.
- Top 100 most powerful phone chips in 2024which is the most powerful chip at the moment for smartphones? let's explore with tipsmake.com now
- Xiaomi launched a hidden camera detector, priced at VND 330,000xiaomi's smoovie multifunction infrared detector not only helps detect hidden cameras but also can be used as an anti-theft device.
- Google is the reason why Android smartphones are sold expensiverecently there have been rumors that google is likely to appear in court by secret acts of agreement with manufacturers, leading to a high price of android smartphones.
- 5 secrets that airlines limit disclosureto ensure safe and accurate operation of a flight, there are 1001 things to do but most of what passengers know is just superficial, the rest is always hidden by the airlines.
- Tricks account for WhatsApp, Viber account by Sirito hijack whatsapp accounts (or viber and other message authentication services), the attacker only needs to know the phone number of the user. this is siri's loophole: if you have fully installed personal information (phone numbers, email ...) in the my information section of siri's settings, crooks only need to activate the support application. this virtual logic and ask questions what is my number (what is my number?)