American programmers have learned to scan the house through the phone
Programmers from Indiana University and the Office for the development of the U.S. Navy Sea Systems (NAVSEA) presented a compilation of stealth technology three-dimensional model space using malicious software to be installed on the smartphone.
Technique is described in a preprint posted on the website arXiv.org, writes briefly about her blog Technology Review.
The authors tested the technology on 20 volunteers that are committed to smartphones secretly installed program. It periodically made photographs of the situation in the experimental room, and will be recorded sensor data movement and position of the vehicle. After pre-treatment (removal of blurry photos and photos taken in the dark), the image secretly transferred to the management server.
On the server from a set of photos with the help of data from the motion sensors built a three-dimensional model of the premises. On average, the models obtained in sufficient detail - they contain about 180-800 thousands of three-dimensional points. For orientation in which it was drawn up special client software that allows individual parts to consider in detail photos.
After receiving the models were handed to other participants of the experiment. Two groups of volunteers were to discover sensitive information contained in the room (passwords, documents, account numbers). In this case, one group of the photographer, and the other - the resulting three-dimensional model. According to the authors, three-dimensional model, in contrast to the pictures, was far more convenient for that - to steal sensitive information with it was much easier.
Experts emphasize that the creation of the program prompted a desire to explore the hidden vulnerabilities arising from the use of modern smartphones. At the end of his article, they discuss a variety of software and processing methods that might impede the creation and use of this type of malware.
אין תגובות:
הוסף רשומת תגובה