Android security flaw: Hackers can know your identity and gender


Android malware

Researchers from five American colleges have discovered a technique to listen in on your conversations and leak your personal information. This is possible through sensors available on Android devices.

A side-channel attack method dubbed EarSpy was developed via the cooperation of researchers from five American colleges. The latter does this by intercepting the vibrations sent by the speaker. Using an Android smartphone’s sensors (accelerometer and various gyroscopes). They can be in use to get details about the caller. As well as the topic of the present conversation once they get the proper analysis.

So, a machine learning method was built to get this conclusion by researchers from Texas A&M Universities, Temple, Dayton, Rutgers, and the New Jersey Institute of Technology. A side channel attack like EarSpy would not have been possible without the current technological advancements in component and sound transmission. Attempting to exploit this on a 2016 OnePlus 3T proven to be impossible. However, a 2021 OnePlus 9 gave the researchers more important information: the speaker of the newest smartphone is significantly more potent and accurate.

Android

Gizchina News of the week


EarSpy: hacking Android smartphones via their sensors is possible

 

Detection
Classifier
Data set
TP
Rate
FP Rate
Precision
Recall
Gender Random Forest emo-DB 98.7% 1.3% 98.7% 98.7%
JL-Corpus 78.6% 21.7% 78.8% 78.6%
Random Subspace emo-DB 84.7% 15.4% 84.7% 84.7%
JL-Corpus 79.4% 21.0% 79.8% 79.4%
Decision Table emo-DB 84.7% 16.7% 84.8% 84.7%
JL-Corpus 77.7% 22.5% 77.7% 77.7%
Speaker Forest
JL-Corpus 61.5% 13.2% 61.1% 61.5%
Random Subspace FSDD 88.7% 5.2% 89.1% 88.7%
JL-Corpus 55.7% 15.5% 55.5% 55.7%
Decision Table FSDD 88.2% 5.4% 88.8% 88.2%
JL-Corpus 59.9% 13.7% 59.6% 59.9%
Speech Random Forest FSDD 41.6% 6.8% 41.6%  41.6%
Random

Subspace

FSDD 39.0% 7.2% 39.1% 39.0%
Decision Table FSDD 33.3% 8.0% 33.6% 33.3%

EarSpy may seem “promising,” but the data it collects is far from accurate. The scientists could only identify the caller’s gender with an average accuracy of 88.7%. Even after training on a limited quantity of audio data. Voice recognition was only accurate 33.3% to 41.6% of the time, while caller ID only detected 73.6% of the time. As artificial intelligence develops at a fast rate, these percentages rapidly approach 100%.

You don’t need to worry just yet if you use an Android smartphone. Because EarSpy cannot access your conversations or information. The scientists who created this method have our best interests at heart. Their research hopes to show how this kind of attack could one day spread widely. If it were in the wrong hands. So, there is no reason to be afraid.

Disclaimer: We may be compensated by some of the companies whose products we talk about, but our articles and reviews are always our honest opinions. For more details, you can check out our editorial guidelines and learn about how we use affiliate links.

Source/VIA :
Previous OnePlus 11 Will Bring At Least Three World Premieres
Next Huawei Watch GT3 and GT3 Pro HarmonyOS Beta Postponed