Researchers from five American colleges have discovered a technique to listen in on your conversations and leak your personal information. This is possible through sensors available on Android devices.
A side-channel attack method dubbed EarSpy was developed via the cooperation of researchers from five American colleges. The latter does this by intercepting the vibrations sent by the speaker. Using an Android smartphone’s sensors (accelerometer and various gyroscopes). They can be in use to get details about the caller. As well as the topic of the present conversation once they get the proper analysis.
So, a machine learning method was built to get this conclusion by researchers from Texas A&M Universities, Temple, Dayton, Rutgers, and the New Jersey Institute of Technology. A side channel attack like EarSpy would not have been possible without the current technological advancements in component and sound transmission. Attempting to exploit this on a 2016 OnePlus 3T proven to be impossible. However, a 2021 OnePlus 9 gave the researchers more important information: the speaker of the newest smartphone is significantly more potent and accurate.
Gizchina News of the week
EarSpy: hacking Android smartphones via their sensors is possible
Detection |
Classifier |
Data set |
TPRate |
FP Rate |
Precision |
Recall |
Gender | Random Forest | emo-DB | 98.7% | 1.3% | 98.7% | 98.7% |
JL-Corpus | 78.6% | 21.7% | 78.8% | 78.6% | ||
Random Subspace | emo-DB | 84.7% | 15.4% | 84.7% | 84.7% | |
JL-Corpus | 79.4% | 21.0% | 79.8% | 79.4% | ||
Decision Table | emo-DB | 84.7% | 16.7% | 84.8% | 84.7% | |
JL-Corpus | 77.7% | 22.5% | 77.7% | 77.7% |
Speaker | Forest | |||||
JL-Corpus | 61.5% | 13.2% | 61.1% | 61.5% | ||
Random Subspace | FSDD | 88.7% | 5.2% | 89.1% | 88.7% | |
JL-Corpus | 55.7% | 15.5% | 55.5% | 55.7% | ||
Decision Table | FSDD | 88.2% | 5.4% | 88.8% | 88.2% | |
JL-Corpus | 59.9% | 13.7% | 59.6% | 59.9% |
Speech | Random Forest | FSDD | 41.6% | 6.8% | 41.6% | 41.6% |
Random
Subspace |
FSDD | 39.0% | 7.2% | 39.1% | 39.0% | |
Decision Table | FSDD | 33.3% | 8.0% | 33.6% | 33.3% |
EarSpy may seem “promising,” but the data it collects is far from accurate. The scientists could only identify the caller’s gender with an average accuracy of 88.7%. Even after training on a limited quantity of audio data. Voice recognition was only accurate 33.3% to 41.6% of the time, while caller ID only detected 73.6% of the time. As artificial intelligence develops at a fast rate, these percentages rapidly approach 100%.
You don’t need to worry just yet if you use an Android smartphone. Because EarSpy cannot access your conversations or information. The scientists who created this method have our best interests at heart. Their research hopes to show how this kind of attack could one day spread widely. If it were in the wrong hands. So, there is no reason to be afraid.