Get our free email newsletter

Hacking with Sound Waves to Help Identify Cybersecurity Gaps

Pexels
Pexels
At first glance, sound doesn’t seem like a particularly dangerous or effective weapon. But in reality, sound can prove disastrous when used properly. Under the right circumstances, sound waves can hack into the sensors of a vast array of devices. People can be totally unaware of these gaps in their cybersecurity, which is where a team of scientists steps in.

Scientists at the University of Michigan are using sound waves to identify gaps in the cybersecurity of everything from automobiles to the Internet of Things. By tricking devices using the sound waves, the scientists were able to identify flaws in the security systems; from there, designers could effectively fix these gaps in their cybersecurity.

The technique for determining cybersecurity flaws using sound involves tricking the devices. The hardware sensors on these devices can be misled into believing there is movement where none has occurred. The inertial sensors of 15 different devices were blasted with a set of precise acoustic tones. The sensors read this as movement from an object, even though none had taken place. By studying how the devices reacted, scientists were able to construct a backdoor into their systems — and take control from within.

- Partner Content -

A Dash of Maxwell’s: A Maxwell’s Equations Primer – Part Two

Maxwell’s Equations are eloquently simple yet excruciatingly complex. Their first statement by James Clerk Maxwell in 1864 heralded the beginning of the age of radio and, one could argue, the age of modern electronics.

Different devices responded to the musical assault in a variety of ways. A Fitbit recorded thousands of false steps thanks to a speaker. A music file allowed them to take over the accelerometer used in an Android app to drive a remote control toy car. The examples go on and on, but the results remained the same: music can be used maliciously in the wrong hangs.

But this turns out to be good news: scientists and engineers can now plan an appropriate response should hackers attempt to use music in their digital attacks. The researchers are working to patent their intellectual property; from there, they can find commercial partners and use this information to reverse-engineer new ways to protect you and your devices from harmful attacks. Who knew a little music could be so dangerous?

Related Articles

Digital Sponsors

Become a Sponsor

Discover new products, review technical whitepapers, read the latest compliance news, and check out trending engineering news.

Get our email updates

What's New

- From Our Sponsors -

Sign up for the In Compliance Email Newsletter

Discover new products, review technical whitepapers, read the latest compliance news, and trending engineering news.