Inaudible Sound as a Covert Channel in Mobile Devices. Deshotels, L. 00063
abstract   bibtex   
Mobile devices can be protected by a variety of information flow control systems. These systems can prevent Trojans from leaking secrets over network connections. As mobile devices become more secure, attackers will begin to use unconventional methods for exfiltrating data.
@article{deshotels_inaudible_nodate,
	title = {Inaudible {Sound} as a {Covert} {Channel} in {Mobile} {Devices}},
	abstract = {Mobile devices can be protected by a variety of information flow control systems. These systems can prevent Trojans from leaking secrets over network connections. As mobile devices become more secure, attackers will begin to use unconventional methods for exfiltrating data.},
	language = {en},
	author = {Deshotels, Luke},
	note = {00063},
	pages = {9}
}
Downloads: 0